• 7835 Citations
  • 46 h-Index
1992 …2018
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the experts' scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 7 Similar Profiles
Servers Engineering & Materials Science
Access control Engineering & Materials Science
Network protocols Engineering & Materials Science
Quorum Mathematics
Server Mathematics
Intrusion detection Engineering & Materials Science
Communication Engineering & Materials Science
Authentication Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2007 2018

Research Output 1992 2018

  • 7835 Citations
  • 46 h-Index
  • 129 Conference contribution
  • 60 Article
  • 10 Conference article
  • 4 Editorial

CPU Elasticity to Mitigate Cross-VM Runtime Monitoring

Mi, Z., Chen, H., Zhang, Y., Peng, S., Wang, X. F. & Reiter, M., Jun 12 2018, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing.

Research output: Contribution to journalArticle

Program processors
Elasticity
Monitoring
Clocks
Side channel attack

Static Evaluation of Noninterference Using Approximate Model Counting

Zhou, Z., Qian, Z., Reiter, M. K. & Zhang, Y., Jul 23 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-May. p. 514-528 15 p. 8418622

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Static analysis
Search engines
18 Citations

Detecting privileged side-channel attacks in shielded execution with Déjà Vu

Chen, S., Zhang, X., Reiter, M. K. & Zhang, Y., Apr 2 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 7-18 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Clocks
Flow graphs
Time measurement
Computer hardware
1 Citations

Flow Reconnaissance via Timing Attacks on SDN Switches

Liu, S., Reiter, M. K. & Sekar, V., Jul 13 2017, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. Lee, K. & Liu, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 196-206 11 p. 7979967

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Switches
Controllers
Side channel attack
Software defined networking
1 Citations

On-demand time blurring to support side-channel defense

Liu, W., Gao, D. & Reiter, M. K., Jan 1 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Foley, S. N., Gollmann, D. & Snekkenes, E. (eds.). Springer Verlag, p. 210-228 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10493 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Virtual Machine
Side Channel Attacks
Granularity
Timing Attack
Timing