Micah Sherr

Orcid: 0000-0001-7413-7673

According to our database1, Micah Sherr authored at least 85 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Editors' Introduction.
Proc. Priv. Enhancing Technol., January, 2024

You Can Find Me Here: A Study of the Early Adoption of Geofeeds.
Proceedings of the Passive and Active Measurement - 25th International Conference, 2024

2023
Editors' Introduction.
Proc. Priv. Enhancing Technol., October, 2023

Cadence: A Simulator for Human Movement-based Communication Protocols.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023

Educators' Perspectives of Using (or Not Using) Online Exam Proctoring.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Accountable Private Set Cardinality for Distributed Measurement.
ACM Trans. Priv. Secur., 2022

Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs.
Proc. Priv. Enhancing Technol., 2022

User Perceptions of the Privacy and Usability of Smart DNS.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services.
Proc. Priv. Enhancing Technol., 2021

Residue-Free Computing.
Proc. Priv. Enhancing Technol., 2021

Examining the Examiners: Students' Privacy and Security Perceptions of Online Proctoring Services.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

2020
Ephemeral Exit Bridges for Tor.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Bypassing Tor Exit Blocking with Exit Bridge Onion Services.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
KIST: Kernel-Informed Socket Transport for Tor.
ACM Trans. Priv. Secur., 2019

Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor.
Proceedings of the 28th USENIX Security Symposium, 2019

You Talk Too Much: Limiting Privacy Exposure Via Voice Input.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Whisper: a unilateral defense against VoIP traffic re-identification attacks.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Understanding Tor Usage with Privacy-Preserving Measurement.
Proceedings of the Internet Measurement Conference 2018, 2018

An Extensive Evaluation of the Internet's Open Proxies.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

DeDoS: Defusing DoS with Dispersion Oriented Software.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Privacy-preserving Network Provenance.
Proc. VLDB Endow., 2017

Where art thou, Eve? Experiences laying traps for Internet eavesdroppers.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

HisTorε: Differentially Private and Robust Statistics Collection for Tor.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Distributed Measurement with Private Set-Union Cardinality.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Private and Verifiable Interdomain Routing Decisions.
IEEE/ACM Trans. Netw., 2016

Data-plane Defenses against Routing Attacks on Tor.
Proc. Priv. Enhancing Technol., 2016

Scalable and Anonymous Group Communication with MTor.
Proc. Priv. Enhancing Technol., 2016

Hidden Voice Commands.
Proceedings of the 25th USENIX Security Symposium, 2016

Dispersing Asymmetric DDoS Attacks with SplitStack.
Proceedings of the 15th ACM Workshop on Hot Topics in Networks, 2016

On Manufacturing Resilient Opaque Constructs Against Static Analysis.
Proceedings of the Computer Security - ESORICS 2016, 2016

Generating risk reduction recommendations to decrease vulnerability of public online profiles.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Accountable wiretapping - or - I know they can hear you now.
J. Comput. Secur., 2015

Helping Users Understand Their Web Footprints.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Multi-class Traffic Morphing for Encrypted VoIP Communication.
Proceedings of the Financial Cryptography and Data Security, 2015

Public Information Exposure Detection: Helping Users Understand Their Web Footprints.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Privacy-aware message exchanges for HumaNets.
Comput. Commun., 2014

The design and implementation of the A<sup>3</sup> application-aware anonymity platform.
Comput. Networks, 2014

Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Censorship Resistance as a Side-Effect (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014

Censorship Resistance as a Side-Effect.
Proceedings of the Security Protocols XXII, 2014

Detecting Covert Timing Channels with Time-Deterministic Replay.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

A Disruption-Resistant MAC Layer for Multichannel Wireless Networks.
Proceedings of the Principles of Distributed Systems - 18th International Conference, 2014

Fair Maximal Independent Sets.
Proceedings of the 2014 IEEE 28th International Parallel and Distributed Processing Symposium, 2014

2013
Understanding Site-Based Inference Potential for Identifying Hidden Attributes.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Identifying individual vulnerability based on public data.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

An Empirical Evaluation of Relay Selection in Tor.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Users get routed: traffic correlation on tor by realistic adversaries.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Validating web content with senser.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Distributed Time-aware Provenance.
Proc. VLDB Endow., 2012

Collaborative Red Teaming for Anonymity System Evaluation.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

$100, 000 prize jackpot. call now!: identifying the pertinent features of SMS spam.
Proceedings of the 35th International ACM SIGIR conference on research and development in Information Retrieval, 2012

Recent Advances in Declarative Networking.
Proceedings of the Practical Aspects of Declarative Languages, 2012

Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Eavesdropping.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

Secure network provenance.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

NetTrails: a declarative platform for maintaining and querying provenance in distributed systems.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

Having your cake and eating it too: routing security with privacy protections.
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011

Exploring the potential benefits of expanded rate limiting in Tor: slow and steady wins the race with Tortoise.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Evading Cellular Data Monitoring with Human Movement Networks.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

Efficient querying and maintenance of network provenance at internet-scale.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010

SecureBlox: customizable secure distributed data processing.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010

A3: An Extensible Platform for Application-Aware Anonymity.
Proceedings of the Network and Distributed System Security Symposium, 2010

Towards a data-centric view of cloud security.
Proceedings of the Second International CIKM Workshop on Cloud Data Management, 2010

2009
Veracity: Practical Secure Network Coordinates via Vote-based Agreements.
Proceedings of the 2009 USENIX Annual Technical Conference, 2009

Scalable Link-Based Relay Selection for Anonymous Routing.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

Can they hear me now?: a security analysis of law enforcement wiretaps.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Application containers without virtual machines.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009

2008
On the (un)reliability of eavesdropping.
Int. J. Secur. Networks, 2008

Security Evaluation of ES&S Voting Machines and Election Management System.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Veracity: a fully decentralized service for securing network coordinate systems.
Proceedings of the 7th international conference on Peer-to-peer systems, 2008

2007
Towards Application-Aware Anonymous Routing.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007

Measurable Security through Isotropic Channels.
Proceedings of the Security Protocols, 2007

Measurable Security through Isotropic Channels (Transcript of Discussion).
Proceedings of the Security Protocols, 2007

2006
Security Protocols with Isotropic Channels.
IACR Cryptol. ePrint Arch., 2006

Sensor Network Security: More Interesting Than You Think.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006

On the Reliability of Network Eavesdropping Tools.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

2005
Signaling Vulnerabilities in Wiretapping Systems.
IEEE Secur. Priv., 2005

Listen Too Closely and You May Be Confused.
Proceedings of the Security Protocols, 2005

2002
Metadata tables to enable dynamic data modeling and web interface design: the SEER example.
Int. J. Medical Informatics, 2002


  Loading...