Clay Shields

According to our database1, Clay Shields authored at least 36 papers between 1997 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




DeDoS: Defusing DoS with Dispersion Oriented Software.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Where art thou, Eve? Experiences laying traps for Internet eavesdroppers.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

Hidden Voice Commands.
Proceedings of the 25th USENIX Security Symposium, 2016

Dispersing Asymmetric DDoS Attacks with SplitStack.
Proceedings of the 15th ACM Workshop on Hot Topics in Networks, 2016

Text-Based Document Similarity Matching Using Sdtext.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Accountable wiretapping - or - I know they can hear you now.
J. Comput. Secur., 2015

Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Efficient Tagging of Remote Peers during Child Pornography Investigations.
IEEE Trans. Dependable Secur. Comput., 2014

Collaborative Red Teaming for Anonymity System Evaluation.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

A system for the proactive, continuous, and efficient collection of digital forensic evidence.
Digit. Investig., 2011

Effective Digital Forensics Research Is Investigator-Centric.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

Forensic investigation of peer-to-peer file sharing networks.
Digit. Investig., 2010

Towards Proactive Forensic Evidentiary Collection.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Strengthening forensic investigations of child pornography on P2P networks.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

IP Covert Channel Detection.
ACM Trans. Inf. Syst. Secur., 2009

Passive-Logging Attacks Against Anonymous Communications Systems.
ACM Trans. Inf. Syst. Secur., 2008

Internet security.
Comput. Commun., 2006

Detecting the Sybil Attack in Mobile Ad hoc Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Authenticated routing for ad hoc networks.
IEEE J. Sel. Areas Commun., 2005

The predecessor attack: An analysis of a threat to anonymous communications systems.
ACM Trans. Inf. Syst. Secur., 2004

The session token protocol for forensics and traceback.
ACM Trans. Inf. Syst. Secur., 2004

Providing process origin information to aid in computer forensic investigations.
J. Comput. Secur., 2004

IP covert timing channels: design and detection.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

Defending Anonymous Communications Against Passive Logging Attack.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Hordes: a Multicast-Based Protocol for Anonymity.
J. Comput. Secur., 2002

Providing Process Origin Information to Aid in Network Traceback.
Proceedings of the General Track: 2002 USENIX Annual Technical Conference, 2002

An Analysis of the Degradation of Anonymous Protocols.
Proceedings of the Network and Distributed System Security Symposium, 2002

A Recursive Session Token Protocol for use in Computer Forensics and TCP Traceback.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

A Secure Routing Protocol for Ad Hoc Networks.
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP 2002), 2002

Responder Anonymity and Anonymous Peer-to-Peer File Sharing.
Proceedings of the 9th International Conference on Network Protocols (ICNP 2001), 2001

HIP - a protocol for hierarchical multicast routing.
Comput. Commun., 2000

A protocol for anonymous communication over the Internet.
Proceedings of the CCS 2000, 2000

KHIP - A Scalable Protocol for Secure Multicast Routing.
Proceedings of the ACM SIGCOMM 1999 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 1999

The Protocol for Hierarchical Multicast Routing.
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998

The Ordered Core Based Tree Protocol.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997