Reiter, Michael K.
2217  Ergebnisse:
Personensuche X
?
1

Formally Verifying a Rollback-Prevention Protocol for TEEs:

, In: Formal Techniques for Distributed Objects, Components, and Systems; Lecture Notes in Computer Science,
Wang, Weili ; Niu, Jianyu ; Reiter, Michael K.. - p. 155-173 , 2024
 
?
2

Optimally Hiding Object Sizes with Constrained Padding:

, In: 2023 IEEE 36th Computer Security Foundations Symposium (CSF),
Reed, Andrew C. ; Reiter, Michael K. - p. 505-520 , 2023
 
?
3

Prioritizing Remediation of Enterprise Hosts by Malware Exe..:

, In: Proceedings of the 39th Annual Computer Security Applications Conference,
 
?
5

EESMR : Energy Efficient BFT---SMR for the masses:

, In: Proceedings of the 24th International Middleware Conference,
 
?
6

Nimble: Fast and Safe Migration of Network Functions:

, In: IEEE INFOCOM 2023 - IEEE Conference on Computer Communications,
 
?
7

Tackling Credential Abuse Together:

, In: Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy,
Reiter, Michael K. - p. 1 ff. , 2023
 
?
8

Privately Evaluating Region Overlaps with Applications to C..:

, In: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P),
Chakraborti, Anrin ; Reiter, Michael K. - p. 1013-1029 , 2023
 
?
9

Using Amnesia to Detect Credential Database Breaches:

, In: Advances in Information Security; Cyber Deception,
Wang, Ke Coby ; Reiter, Michael K. - p. 183-215 , 2022
 
?
10

Deceiving ML-Based Friend-or-Foe Identification for Executa..:

, In: Advances in Information Security; Cyber Deception,
Lucas, Keane ; Sharif, Mahmood ; Bauer, Lujo.. - p. 217-249 , 2022
 
?
11

Defeating traffic analysis via differential privacy: a case..:

Zhang, Xiaokuan ; Hamm, Jihun ; Reiter, Michael K..
International Journal of Information Security.  21 (2022)  3 - p. 689-706 , 2022
 
?
12

ENGRAFT : Enclave-guarded Raft on Byzantine Faulty Nodes:

, In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security,
Wang, Weili ; Deng, Sen ; Niu, Jianyu.. - p. 2841-2855 , 2022
 
?
13

The Netivus Manifesto: making collaborative network managem..:

Severini, Joseph ; Mysore, Radhika Niranjan ; Sekar, Vyas..
ACM SIGCOMM Computer Communication Review.  51 (2021)  2 - p. 10-17 , 2021
 
?
14

Malware Makeover: Breaking ML-based Static Analysis by Modi..:

, In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security,
Lucas, Keane ; Sharif, Mahmood ; Bauer, Lujo.. - p. 744-758 , 2021
 
?
15

The Netivus Manifesto : making collaborative network man..:

Severini, Joseph ; Mysore, Radhika Niranjan ; Sekar, Vyas..
ACM SIGCOMM Computer Communication Review.  51 (2021)  2 - p. 10-17 , 2021
 
1-15