Micah Sherr
Micah Sherr
Associate Professor of Computer Science, Georgetown University
Verified email at cs.georgetown.edu - Homepage
TitleCited byYear
Hidden voice commands
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 513-530, 2016
2062016
Users get routed: Traffic correlation on Tor by realistic adversaries
A Johnson, C Wacek, R Jansen, M Sherr, P Syverson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2062013
Efficient querying and maintenance of network provenance at internet-scale
W Zhou, M Sherr, T Tao, X Li, BT Loo, Y Mao
Proceedings of the 2010 ACM SIGMOD International Conference on Management of …, 2010
1462010
Secure network provenance
W Zhou, Q Fei, A Narayan, A Haeberlen, BT Loo, M Sherr
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
1132011
An Empirical Evaluation of Relay Selection in Tor.
C Wacek, H Tan, KS Bauer, M Sherr
NDSS, 2013
752013
ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation.
KS Bauer, M Sherr, D Grunwald
CSET, 2011
752011
Let SDN be your eyes: Secure forensics in data center networks
A Bates, K Butler, A Haeberlen, M Sherr, W Zhou
Proceedings of the NDSS workshop on security of emerging network …, 2014
632014
Scalable link-based relay selection for anonymous routing
M Sherr, M Blaze, BT Loo
International Symposium on Privacy Enhancing Technologies Symposium, 73-93, 2009
612009
Cocaine noodles: exploiting the gap between human and machine speech recognition
T Vaidya, Y Zhang, M Sherr, C Shields
9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), 2015
602015
Private and verifiable interdomain routing decisions
M Zhao, W Zhou, AJT Gurney, A Haeberlen, M Sherr, BT Loo
ACM SIGCOMM Computer Communication Review 42 (4), 383-394, 2012
462012
Never Been {KIST}: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport
R Jansen, J Geddes, C Wacek, M Sherr, P Syverson
23rd {USENIX} Security Symposium ({USENIX} Security 14), 127-142, 2014
412014
Distributed time-aware provenance
W Zhou, S Mapara, Y Ren, Y Li, A Haeberlen, Z Ives, BT Loo, M Sherr
Proceedings of the VLDB Endowment 6 (2), 49-60, 2012
412012
Towards a data-centric view of cloud security
W Zhou, M Sherr, WR Marczak, Z Zhang, T Tao, BT Loo, I Lee
Proceedings of the second international workshop on Cloud data management, 25-32, 2010
402010
Security challenges in next generation cyber physical systems
M Anand, E Cronin, M Sherr, M Blaze, Z Ives, I Lee
Beyond SCADA: Networked Embedded Control for Cyber Physical Systems 41, 2006
402006
Exploring the potential benefits of expanded rate limiting in tor: Slow and steady wins the race with tortoise
WB Moore, C Wacek, M Sherr
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
392011
Veracity: Practical Secure Network Coordinates via Vote-based Agreements.
M Sherr, M Blaze, BT Loo
USENIX Annual Technical Conference, 2009
382009
Security evaluation of ES&S voting machines and election management system
A Aviv, P Černy, S Clark, E Cronin, G Shah, M Sherr, M Blaze
Proceedings of the conference on Electronic voting technology, 11, 2008
382008
Signaling vulnerabilities in wiretapping systems
M Sherr, E Cronin, S Clark, M Blaze
IEEE Security & Privacy 3 (6), 13-25, 2005
382005
Detecting covert timing channels with time-deterministic replay
A Chen, WB Moore, H Xiao, A Haeberlen, LTX Phan, M Sherr, W Zhou
11th {USENIX} Symposium on Operating Systems Design and Implementation …, 2014
372014
Ał: An Extensible Platform for Application-Aware Anonymity
M Sherr, A Mao, WR Marczak, W Zhou, BT Loo, MA Blaze
362010
The system can't perform the operation now. Try again later.
Articles 1–20