Micah Sherr
Micah Sherr
Associate Professor of Computer Science, Georgetown University
Email verificata su cs.georgetown.edu - Home page
Titolo
Citata da
Citata da
Anno
Hidden voice commands
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 513-530, 2016
3682016
Users get routed: Traffic correlation on Tor by realistic adversaries
A Johnson, C Wacek, R Jansen, M Sherr, P Syverson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2442013
Efficient querying and maintenance of network provenance at internet-scale
W Zhou, M Sherr, T Tao, X Li, BT Loo, Y Mao
Proceedings of the 2010 ACM SIGMOD International Conference on Management of …, 2010
1732010
Secure network provenance
W Zhou, Q Fei, A Narayan, A Haeberlen, BT Loo, M Sherr
Proceedings of the twenty-third ACM symposium on operating systems …, 2011
1342011
Cocaine noodles: exploiting the gap between human and machine speech recognition
T Vaidya, Y Zhang, M Sherr, C Shields
9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), 2015
1072015
An Empirical Evaluation of Relay Selection in Tor.
C Wacek, H Tan, KS Bauer, M Sherr
NDSS, 2013
882013
ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation.
KS Bauer, M Sherr, D Grunwald
CSET, 2011
822011
Let SDN be your eyes: Secure forensics in data center networks
A Bates, K Butler, A Haeberlen, M Sherr, W Zhou
Proceedings of the NDSS workshop on security of emerging network …, 2014
742014
Scalable link-based relay selection for anonymous routing
M Sherr, M Blaze, BT Loo
International Symposium on Privacy Enhancing Technologies Symposium, 73-93, 2009
672009
Never Been {KIST}: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport
R Jansen, J Geddes, C Wacek, M Sherr, P Syverson
23rd {USENIX} Security Symposium ({USENIX} Security 14), 127-142, 2014
492014
Private and verifiable interdomain routing decisions
M Zhao, W Zhou, AJT Gurney, A Haeberlen, M Sherr, BT Loo
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies …, 2012
472012
Security challenges in next generation cyber physical systems
M Anand, E Cronin, M Sherr, M Blaze, Z Ives, I Lee
Beyond SCADA: Networked Embedded Control for Cyber Physical Systems 41, 2006
472006
Distributed time-aware provenance
W Zhou, S Mapara, Y Ren, Y Li, A Haeberlen, Z Ives, BT Loo, M Sherr
Proceedings of the VLDB Endowment 6 (2), 49-60, 2012
462012
Detecting covert timing channels with time-deterministic replay
A Chen, WB Moore, H Xiao, A Haeberlen, LTX Phan, M Sherr, W Zhou
11th {USENIX} Symposium on Operating Systems Design and Implementation …, 2014
442014
Exploring the potential benefits of expanded rate limiting in tor: Slow and steady wins the race with tortoise
WB Moore, C Wacek, M Sherr
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
432011
Veracity: Practical Secure Network Coordinates via Vote-based Agreements.
M Sherr, M Blaze, BT Loo
USENIX Annual Technical Conference, 2009
422009
Security evaluation of ES&S voting machines and election management system
A Aviv, P Černy, S Clark, E Cronin, G Shah, M Sherr, M Blaze
Proceedings of the conference on Electronic voting technology, 1-13, 2008
412008
A³: An Extensible Platform for Application-Aware Anonymity
M Sherr, A Mao, WR Marczak, W Zhou, BT Loo, MA Blaze
402010
Towards a data-centric view of cloud security
W Zhou, M Sherr, WR Marczak, Z Zhang, T Tao, BT Loo, I Lee
Proceedings of the second international workshop on Cloud data management, 25-32, 2010
392010
Signaling vulnerabilities in wiretapping systems
M Sherr, E Cronin, S Clark, M Blaze
IEEE Security & Privacy 3 (6), 13-25, 2005
372005
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20