Folgen
Micah Sherr
Micah Sherr
Callahan Family Professor of Computer Science, Georgetown University
Bestätigte E-Mail-Adresse bei cs.georgetown.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Hidden voice commands
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
25th USENIX security symposium (USENIX security 16), 513-530, 2016
7742016
Users get routed: Traffic correlation on Tor by realistic adversaries
A Johnson, C Wacek, R Jansen, M Sherr, P Syverson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3742013
Cocaine noodles: exploiting the gap between human and machine speech recognition
T Vaidya, Y Zhang, M Sherr, C Shields
9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015
2512015
Efficient querying and maintenance of network provenance at internet-scale
W Zhou, M Sherr, T Tao, X Li, BT Loo, Y Mao
Proceedings of the 2010 ACM SIGMOD International Conference on Management of …, 2010
2102010
Secure network provenance
W Zhou, Q Fei, A Narayan, A Haeberlen, BT Loo, M Sherr
Proceedings of the twenty-third ACM symposium on operating systems …, 2011
1772011
{ExperimenTor}: A testbed for safe and realistic tor experimentation
K Bauer, M Sherr, D Grunwald
4th Workshop on Cyber Security Experimentation and Test (CSET 11), 2011
1062011
An Empirical Evaluation of Relay Selection in Tor.
C Wacek, H Tan, KS Bauer, M Sherr
NDss, 2013
1042013
Let SDN be your eyes: Secure forensics in data center networks
A Bates, K Butler, A Haeberlen, M Sherr, W Zhou
Proceedings of the NDSS workshop on security of emerging network …, 2014
1022014
Understanding tor usage with privacy-preserving measurement
A Mani, T Wilson-Brown, R Jansen, A Johnson, M Sherr
Proceedings of the Internet Measurement Conference 2018, 175-187, 2018
922018
Scalable link-based relay selection for anonymous routing
M Sherr, M Blaze, BT Loo
Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009
802009
Security challenges in next generation cyber physical systems
M Anand, E Cronin, M Sherr, M Blaze, Z Ives, I Lee
Beyond SCADA: Networked Embedded Control for Cyber Physical Systems 41, 2006
682006
Examining the examiners: Students' privacy and security perceptions of online proctoring services
DG Balash, D Kim, D Shaibekova, RA Fainchtein, M Sherr, AJ Aviv
Seventeenth symposium on usable privacy and security (SOUPS 2021), 633-652, 2021
652021
Distributed time-aware provenance
W Zhou, S Mapara, Y Ren, Y Li, A Haeberlen, Z Ives, BT Loo, M Sherr
Proceedings of the VLDB Endowment 6 (2), 49-60, 2012
652012
Detecting Covert Timing Channels with {Time-Deterministic} Replay
A Chen, WB Moore, H Xiao, A Haeberlen, LTX Phan, M Sherr, W Zhou
11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014
612014
Never Been {KIST}:{Tor’s} Congestion Management Blossoms with {Kernel-Informed} Socket Transport
R Jansen, J Geddes, C Wacek, M Sherr, P Syverson
23rd USENIX Security Symposium (USENIX Security 14), 127-142, 2014
602014
Exploring the potential benefits of expanded rate limiting in tor: Slow and steady wins the race with tortoise
WB Moore, C Wacek, M Sherr
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
562011
Private and verifiable interdomain routing decisions
M Zhao, W Zhou, AJT Gurney, A Haeberlen, M Sherr, BT Loo
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies …, 2012
552012
Security evaluation of ES&S voting machines and election management system
A Aviv, P Černy, S Clark, E Cronin, G Shah, M Sherr, M Blaze
Proceedings of the conference on Electronic voting technology, 1-13, 2008
552008
Point break: A study of bandwidth {Denial-of-Service} attacks against tor
R Jansen, T Vaidya, M Sherr
28th USENIX security symposium (USENIX Security 19), 1823-1840, 2019
522019
Does being verified make you more credible? Account verification's effect on tweet credibility
T Vaidya, D Votipka, ML Mazurek, M Sherr
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
472019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20