Micah Sherr
Micah Sherr
Callahan Family Professor of Computer Science, Georgetown University
Verified email at - Homepage
Cited by
Cited by
Hidden voice commands.
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, DA Wagner, ...
Usenix security symposium, 513-530, 2016
Users get routed: Traffic correlation on Tor by realistic adversaries
A Johnson, C Wacek, R Jansen, M Sherr, P Syverson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Cocaine noodles: exploiting the gap between human and machine speech recognition
T Vaidya, Y Zhang, M Sherr, C Shields
9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), 2015
Efficient querying and maintenance of network provenance at internet-scale
W Zhou, M Sherr, T Tao, X Li, BT Loo, Y Mao
Proceedings of the 2010 ACM SIGMOD International Conference on Management of …, 2010
Secure network provenance
W Zhou, Q Fei, A Narayan, A Haeberlen, BT Loo, M Sherr
Proceedings of the twenty-third ACM symposium on operating systems …, 2011
An Empirical Evaluation of Relay Selection in Tor.
C Wacek, H Tan, KS Bauer, M Sherr
NDss, 2013
ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation.
KS Bauer, M Sherr, D Grunwald
CSET, 2011
Let SDN be your eyes: Secure forensics in data center networks
A Bates, K Butler, A Haeberlen, M Sherr, W Zhou
Proceedings of the NDSS workshop on security of emerging network …, 2014
Understanding tor usage with privacy-preserving measurement
A Mani, T Wilson-Brown, R Jansen, A Johnson, M Sherr
Proceedings of the Internet Measurement Conference 2018, 175-187, 2018
Scalable link-based relay selection for anonymous routing
M Sherr, M Blaze, BT Loo
Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009
Security challenges in next generation cyber physical systems
M Anand, E Cronin, M Sherr, M Blaze, Z Ives, I Lee
Beyond SCADA: Networked Embedded Control for Cyber Physical Systems 41, 2006
Detecting covert timing channels with time-deterministic replay
A Chen, WB Moore, H Xiao, A Haeberlen, LTX Phan, M Sherr, W Zhou
11th {USENIX} Symposium on Operating Systems Design and Implementation …, 2014
Distributed time-aware provenance
W Zhou, S Mapara, Y Ren, Y Li, A Haeberlen, Z Ives, BT Loo, M Sherr
Proceedings of the VLDB Endowment 6 (2), 49-60, 2012
Never Been {KIST}: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport
R Jansen, J Geddes, C Wacek, M Sherr, P Syverson
23rd {USENIX} Security Symposium ({USENIX} Security 14), 127-142, 2014
Private and verifiable interdomain routing decisions
M Zhao, W Zhou, AJT Gurney, A Haeberlen, M Sherr, BT Loo
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies …, 2012
Exploring the potential benefits of expanded rate limiting in tor: Slow and steady wins the race with tortoise
WB Moore, C Wacek, M Sherr
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
Security evaluation of ES&S voting machines and election management system
A Aviv, P Černy, S Clark, E Cronin, G Shah, M Sherr, M Blaze
Proceedings of the conference on Electronic voting technology, 1-13, 2008
Veracity: Practical Secure Network Coordinates via Vote-based Agreements.
M Sherr, M Blaze, BT Loo
USENIX Annual Technical Conference, 2009
Towards a data-centric view of cloud security
W Zhou, M Sherr, WR Marczak, Z Zhang, T Tao, BT Loo, I Lee
Proceedings of the second international workshop on Cloud data management, 25-32, 2010
Ał: An Extensible Platform for Application-Aware Anonymity
M Sherr, A Mao, WR Marczak, W Zhou, BT Loo, MA Blaze
The system can't perform the operation now. Try again later.
Articles 1–20