USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 19 results:
Filters: Author is Michael K. Reiter [Clear All Filters]
Adversarial Training for Raw-Binary Malware Classifiers. 32nd USENIX Security Symposium (USENIX Security 23). :1163--1180.
.
2023. Distance-Aware Private Set Intersection. 32nd USENIX Security Symposium (USENIX Security 23). :319--336.
.
2023. Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication. 30th USENIX Security Symposium (USENIX Security 21). :1--18.
.
2021. Using Amnesia to Detect Credential Database Breaches. 30th USENIX Security Symposium (USENIX Security 21). :839--855.
.
2021. Detecting Stuffing of a User’s Credentials at Her Own Accounts. 29th USENIX Security Symposium (USENIX Security 20). :2201--2218.
.
2020. A System to Verify Network Behavior of Known Cryptographic Clients. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :177--195.
.
2017. The Effect of Repeated Login Prompts on Phishing Susceptibility. The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2016). :13--19.
.
2016. Simplifying Software-Defined Network Optimization Using SOL. 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). :223-237.
.
2016. Stealing Machine Learning Models via Prediction APIs. 25th USENIX Security Symposium (USENIX Security 16). :601--618.
.
2016. Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices. Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). :89--102.
.
2015. Toward Strong, Usable Access Control for Shared Distributed Data. 12th USENIX Conference on File and Storage Technologies (FAST 14). :89--103.
.
2014. Design and Implementation of a Consolidated Middlebox Architecture. 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). :323--336.
.
2012. CSAMP: A System for Network-Wide Flow Monitoring. 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 08).
.
2008. The Practical Subtleties of Biometric Key Generation. 17th USENIX Security Symposium (USENIX Security 08).
.
2008. Integrity Checking in Cryptographic File Systems with Constant Trusted Storage. 16th USENIX Security Symposium (USENIX Security 07).
.
2007. Bump in the Ether: A Framework for Securing Sensitive User Input . 2006 USENIX Annual Technical Conference (USENIX ATC 06).
.
2006. On Gray-Box Program Tracking for Anomaly Detection. 13th USENIX Security Symposium (USENIX Security 04).
.
2004. On User Choice in Graphical Password Schemes. 13th USENIX Security Symposium (USENIX Security 04).
.
2004. The Design and Analysis of Graphical Passwords. 8th USENIX Security Symposium (USENIX Security 99).
.
1999.