Follow
Micah Sherr
Micah Sherr
Callahan Family Professor of Computer Science, Georgetown University
Verified email at cs.georgetown.edu - Homepage
Title
Cited by
Cited by
Year
Hidden voice commands
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
25th USENIX security symposium (USENIX security 16), 513-530, 2016
7412016
Users get routed: Traffic correlation on Tor by realistic adversaries
A Johnson, C Wacek, R Jansen, M Sherr, P Syverson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3672013
Cocaine noodles: exploiting the gap between human and machine speech recognition
T Vaidya, Y Zhang, M Sherr, C Shields
9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015
2442015
Efficient querying and maintenance of network provenance at internet-scale
W Zhou, M Sherr, T Tao, X Li, BT Loo, Y Mao
Proceedings of the 2010 ACM SIGMOD International Conference on Management of …, 2010
2112010
Secure network provenance
W Zhou, Q Fei, A Narayan, A Haeberlen, BT Loo, M Sherr
Proceedings of the twenty-third ACM symposium on operating systems …, 2011
1742011
{ExperimenTor}: A testbed for safe and realistic tor experimentation
K Bauer, M Sherr, D Grunwald
4th Workshop on Cyber Security Experimentation and Test (CSET 11), 2011
1042011
An Empirical Evaluation of Relay Selection in Tor.
C Wacek, H Tan, KS Bauer, M Sherr
NDss, 2013
1032013
Let SDN be your eyes: Secure forensics in data center networks
A Bates, K Butler, A Haeberlen, M Sherr, W Zhou
Proceedings of the NDSS workshop on security of emerging network …, 2014
992014
Understanding tor usage with privacy-preserving measurement
A Mani, T Wilson-Brown, R Jansen, A Johnson, M Sherr
Proceedings of the Internet Measurement Conference 2018, 175-187, 2018
872018
Scalable link-based relay selection for anonymous routing
M Sherr, M Blaze, BT Loo
Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009
772009
Security challenges in next generation cyber physical systems
M Anand, E Cronin, M Sherr, M Blaze, Z Ives, I Lee
Beyond SCADA: Networked Embedded Control for Cyber Physical Systems 41, 2006
682006
Distributed time-aware provenance
W Zhou, S Mapara, Y Ren, Y Li, A Haeberlen, Z Ives, BT Loo, M Sherr
Proceedings of the VLDB Endowment 6 (2), 49-60, 2012
642012
Detecting Covert Timing Channels with {Time-Deterministic} Replay
A Chen, WB Moore, H Xiao, A Haeberlen, LTX Phan, M Sherr, W Zhou
11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014
602014
Never Been {KIST}:{Tor’s} Congestion Management Blossoms with {Kernel-Informed} Socket Transport
R Jansen, J Geddes, C Wacek, M Sherr, P Syverson
23rd USENIX Security Symposium (USENIX Security 14), 127-142, 2014
602014
Examining the examiners: Students' privacy and security perceptions of online proctoring services
DG Balash, D Kim, D Shaibekova, RA Fainchtein, M Sherr, AJ Aviv
Seventeenth symposium on usable privacy and security (SOUPS 2021), 633-652, 2021
552021
Private and verifiable interdomain routing decisions
M Zhao, W Zhou, AJT Gurney, A Haeberlen, M Sherr, BT Loo
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies …, 2012
552012
Exploring the potential benefits of expanded rate limiting in tor: Slow and steady wins the race with tortoise
WB Moore, C Wacek, M Sherr
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
552011
Security evaluation of ES&S voting machines and election management system
A Aviv, P Černy, S Clark, E Cronin, G Shah, M Sherr, M Blaze
Proceedings of the conference on Electronic voting technology, 1-13, 2008
552008
Point break: A study of bandwidth {Denial-of-Service} attacks against tor
R Jansen, T Vaidya, M Sherr
28th USENIX security symposium (USENIX Security 19), 1823-1840, 2019
502019
Veracity: Practical Secure Network Coordinates via Vote-based Agreements.
M Sherr, M Blaze, BT Loo
USENIX Annual Technical Conference, 2009
472009
The system can't perform the operation now. Try again later.
Articles 1–20