Publications

The papers referenced on this page are included as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Please respect the rights of the copyright holder(s), and do not repost the works without their explicit permission.

Please report errors or omissions to seclab@cs.georgetown.edu.

2024

  1. Powers, Carson, Nickolas Gravel, Christopher Pellegrini, Micah Sherr, Michelle L. Mazurek, and Daniel Votipka. “‘I Can Say I’m John Travolta... but I’m Not John Travolt’: Investigating the Impact of Changes to Social Media Verification Policies’ on User Perceptions of Verified Accounts.” In Symposium on Usable Privacy and Security (SOUPS), 2024.
    [details]
  2. Wails, Ryan, George Arnold Sullivan, Micah Sherr, and Rob Jansen. “On Precisely Detecting Censorship Circumvention in Real-World Networks.” In Network and Distributed System Security Symposium (NDSS), 2024.
    [paper]
    [details]
  3. Kon, Patrick Tser Jern, Aniket Gattani, Dhiraj Saharia, Tianyu Cao, Diogo Barradas, Ang Chen, Micah Sherr, and Benjamin E. Ujcich. “NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge.” In IEEE Symposium on Security and Privacy (S&P), 2024.
    [details]
  4. Fainchtein, Rahel A., and Micah Sherr. “You Can Find Me Here: A Study of the Early Adoption of Geofeeds.” In Passive and Active Measurement Conference (PAM), 2024.
    [paper]
    [details]

2023

  1. Balash, David G., Rahel A. Fainchtein, Elena Korkes, Miles Grant, Micah Sherr, and Adam J. Aviv. “Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring.” In USENIX Security Symposium (USENIX), 2023.
    [paper]
    [details]
  2. Li, Ji You, Jiachi Zhang, Wenchao Zhou, Yuhang Liu, Shuai Zhang, Zhuoming Xue, Ding Xu, Hua Fan, Fangyuan Zhou, and Feifei Li. “Eigen: End-to-End Resource Optimization for Large-Scale Databases on the Cloud.” In International Conference on Very Large Data Bases (VLDB), 2023.
    [paper]
    [details]
  3. Berger, Harel, Micah Sherr, and Adam J. Aviv. “Cadence: A Simulator for Human Movement-Based Communication Protocols.” In Workshop on Cyber Security Experimentation and Test (CSET), 2023.
    [paper]
    [details]
  4. Kim, Jiwon, Benjamin E. Ujcich, and Dave (Jing) Tian. “Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance.” In USENIX Security Symposium (USENIX), 2023.
    [paper]
    [details]
  5. Wails, Ryan, Rob Jansen, Aaron Johnson, and Micah Sherr. “Proteus: Programmable Protocols for Censorship Circumvention.” In Free and Open Communications on the Internet (FOCI), 2023.
    [paper]
    [details]
  6. Jansen, Rob, and Ryan Wails. “Data-Explainable Website Fingerprinting with Network Simulation.” PoPETs: Proceedings on Privacy Enhancing Technologies 2023, no. 4 (2023).
    [details]

2022

  1. Fainchtein, Rahel A., Adam J. Aviv, and Micah Sherr. “User Perceptions of the Privacy and Usability of Smart DNS.” In Annual Computer Security Applications Conference (ACSAC), 2022.
    [paper]
    [details]
  2. Wails, Ryan, Andrew Stange, Eliana Troper, Aylin Caliskan, Roger Dingledine, Rob Jansen, and Micah Sherr. “Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs.” In Privacy Enhancing Technologies Symposium (PETS), 2022.
    [paper]
    [details]
  3. Fenske, Ellis, Akshaya Mani, Aaron Johnson, and Micah Sherr. “Accountable Private Set Cardinality for Distributed Measurement.” ACM Transactions on Privacy and Security (TOPS) 25, no. 4 (July 2022).
    [paper]
    [details]
  4. Dickens, Charlie, Justin Thaler, and Daniel Ting. “(Nearly) All Cardinality Estimators Are Differentially Private.” ArXiv Preprint ArXiv:2203.15400, 2022.
    [details]
  5. Jansen, Rob, Jim Newsome, and Ryan Wails. “Co-Opting Linux Processes for High-Performance Network Simulation.” In Proceedings of the 2022 USENIX Annual Technical Conference (USENIX ATC ’22). Carlsbad, CA, USA: USENIX Association, 2022.
    [details]

2021

  1. Balash, David G., Dongkun Kim, Darika Shaibekova, Rahel A. Fainchtein, and Micah Sherr, and Adam J. Aviv. “Examining the Examiners: Students’ Privacy and Security Perceptions of Online Proctoring Services.” In Symposium On Usable Privacy and Security (SOUPS), 2021.
    [paper]
    [details]
  2. Fainchtein, Rahel A., Adam J. Aviv, Micah Sherr, Stephen Ribaudo, and Armaan Khullar. “Holes in the Geofence: Privacy Vulnerabilities in ‘Smart’ DNS Services.” Proceedings on Privacy Enhancing Technologies (PoPETS), 2021.
    [paper]
    [details]
  3. Golovnev, Alexander, Jonathan Lee, Srinath Setty, Justin Thaler, and Riad S. Wahby. “Brakedown: Linear-Time and Post-Quantum SNARKs for R1CS.” Cryptology ePrint Archive, Report 2021/1043, 2021.
    [details]
  4. Ujcich, Benjamin E., Samuel Jero, Richard Skowyra, Adam Bates, William H. Sanders, and Hamed Okhravi. “Causal Analysis for Software-Defined Networking Attacks.” In USENIX Security Symposium (Security), 2021.
    [details]
  5. Voskobojnikov, Artemij, Volker Skwarek, Atefeh Mashatan, Shin’Ichiro Matsuo, Chris Rowell, and Tim Weingärtner. “Balancing Security: A Moving Target.” In Building Decentralized Trust : Multidisciplinary Perspectives on the Design of Blockchains and Distributed Ledgers, edited by Victoria L. Lemieux and Chen Feng, 63–94. Springer International Publishing, 2021.
    [details]
  6. “Smart Auto Insurance: High Resolution, Dynamic, Privacy-Driven, Telematic Insurance,” 2021.
    [details]
  7. Ikeno, Yusuke, James Angel, Shin’ichiro Matsuo, and Ryosuke Ushida. “Auction Type Resolution on Smart Derivatives,” 2021.
    [details]
  8. Sako, Kentaro, Shin’ichiro Matsuo, and Sachin Meier. “Fairness in ERC Token Markets: A Case Study of CryptoKitties.” In Financial Cryptography and Data Security (FC), 2021.
    [details]
  9. Shibuya, Yoko, Go Yamamoto, Fuhito Kojima, Elaine Shi, Shin’ichiro Matsuo, and Aron Laszka. “Selfish Mining Attacks Exacerbated by Elastic Hash Supply.” In Financial Cryptography and Data Security (FC), 2021.
    [details]
  10. Matsuo, Shin’ichiro, and Nat Sakimura. Blockchain Gaps - From Myth to Real Life. Springer Nature, 2021.
    [details]
  11. Daker, Richard J., Griffin A. Colaizzi, Ariana M. Mastrogiannis, Micah Sherr, Ian M. Lyons, and Adam E. Green. “Predictive Effects of Creative Abilities and Attitudes on Performance in University-Level Computer Science Courses.” Translational Issues in Psychological Science, 2021.
    [details]
  12. Gupta, Nirupam, Shripad Gade, Nikhil Chopra, and Nitin H. Vaidya. “Preserving Statistical Privacy in Distributed Optimization.” IEEE Control. Syst. Lett. 5, no. 3 (2021): 779–84.
    [details]
  13. Arkema, Logan, and Micah Sherr. “Residue-Free Computing.” Proceedings on Privacy Enhancing Technologies (PoPETS), 2021.
    [paper]
    [details]

2020

  1. Zhang, Zhao, Wenchao Zhou, and Micah Sherr. “Bypassing Tor Exit Blocking with Exit Bridge Onion Services.” In ACM Conference on Computer and Communications Security (CCS), 2020.
    [paper]
    [details]
  2. Zhang, Zhao, Tavish Vaidya, Kartik Subramanian, Wenchao Zhou, and Micah Sherr. “Ephemeral Exit Bridges for Tor.” In IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2020.
    [paper]
    [details]
  3. Ujcich, Benjamin E., Samuel Jero, Richard Skowyra, Steven R. Gomez, Adam Bates, William H. Sanders, and Hamed Okhravi. “Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking.” In Network and Distributed System Security Symposium (NDSS). Internet Society, 2020.
    [details]
  4. Bartholic, Michael, Jianan Su, Ryosuke Ushida, Yusuke Ikeno, Zhengrong Gu, and Shinichiro Matsuo. “Proof of No-Work: How to Incentivize Individuals to Stay at Home.” In International Workshop On Cryptocurrencies and Blockchain Technology (CBT), 2020.
    [details]
  5. Cohen, Aloni, and Kobbi Nissim. “Towards Formalizing the GDPR’s Notion of Singling Out.” Proceedings of the National Academy of Sciences 117, no. 15 (2020): 8344–52.
    [details]
  6. Gupta, Nirupam, and Nitin H. Vaidya. “Fault-Tolerance in Distributed Optimization: The Case of Redundancy.” In ACM Symposium on Principles of Distributed Computing (PODC), edited by Yuval Emek and Christian Cachin, 2020.
    [details]
  7. Rochet, Florentin, Ryan Wails, Aaron Johnson, Prateek Mittal, and Olivier Pereira. “CLAPS: Client-Location-Aware Path Selection in Tor.” In ACM SIGSAC Conference on Computer And Communications Security (CCS), 2020.
    [details]
  8. Agrawal, Shweta, Michael Clear, Ophir Frieder, Sanjam Garg, Adam O’Neill, and Justin Thaler. “Ad Hoc Multi-Input Functional Encryption.” In Innovations in Theoretical Computer Science Conference (ITCS), 2020.
    [details]
  9. Thaler, Justin. “Proofs, Arguments, and Zero-Knowledge,” 2020. http://people.cs.georgetown.edu/jthaler/ProofsArgsAndZK.html.
    [details]
  10. Liu, Shuo, Lisa Singh, and Kevin Tian. “Information Exposure From Relational Background Knowledge on Social Media.” In International Conference on Data Science and Advanced Analytics (DSAA). IEEE, 2020.
    [details]
  11. Su, Jianan, Michael Bartholic, Andrew Stange, Ryosuke Ushida, and Shin’ichiro Matsuo. “How to Dynamically Incentivize Sufficient Level of IoT Security.” In Financial Cryptography and Data Security, 2020.
    [details]
  12. Matsuo, Shin’ichiro. “Effectiveness of Multi-Stakeholder Discussions for Decentralized Finance: A Conference Report of CoDeFi 2020.” In Financial Cryptography and Data Security, 221–29, 2020.
    [details]
  13. Gupta, Nirupam, and Nitin H. Vaidya. “Resilience in Collaborative Optimization: Redundant and Independent Cost Functions.” CoRR abs/2003.09675 (2020).
    [details]

2019

  1. Vaidya, Tavish, Tim Walsh, and Micah Sherr. “Whisper: A Unilateral Defense Against VoIP Traffic Re-Identification Attacks.” In Annual Computer Security Applications Conference (ACSAC), 2019.
    [details]
  2. Jansen, Rob, Tavish Vaidya, and Micah Sherr. “Point Break: A Study of Tor’s Resilience to Bandwidth Denial-of-Service Attack.” In USENIX Security Symposium (USENIX), 2019.
    [details]
  3. Vaidya, Tavish, Daniel J. Votipka, Michelle Mazurek, and Micah Sherr. “Does Being Verified Make You More Credible? The Effect of Account Verification on Tweet Credibility.” In ACM Conference on Human Factors in Computing Systems (CHI), 2019.
    [details]
  4. Su, Lili, and Nitin H. Vaidya. “Defending Non-Bayesian Learning against Adversarial Attacks.” Distributed Comput. 32, no. 4 (2019): 277–89.
    [details]
  5. Vaidya, Tavish, and Micah Sherr. “You Talk Too Much: Limiting Privacy Exposure via Voice Input.” In International Workshop on Privacy Engineering (IWPE), 2019.
    [details]
  6. Wails, Ryan, Aaron Johnson, Daniel Starin, Arkady Yerukhimovich, and S. Dov Gordon. “Stormy: Statistics in Tor by Measuring Securely.” In Conference on Computer and Communications Security (CCS), 2019.
    [details]
  7. Gupta, Nirupam, and Nitin H. Vaidya. “Byzantine Fault-Tolerant Parallelized Stochastic Gradient Descent for Linear Regression.” In 57th Annual Allerton Conference on Communication, Control, and Computing, 2019.
    [details]
  8. Wan, Gerry, Aaron Johnson, Ryan Wails, Sameer Wagh, and Prateek Mittal. “Guard Placement Attacks on Path Selection Algorithms for Tor.” Proceedings on Privacy Enhancing Technologies 2019, no. 4 (2019): 272–91.
    [details]

2018

  1. Demoulin, Henri Maxime, Tavish Vaidya, Isaac Pedisich, Bob DiMaiolo, Jingyu Qian, Chirag Shah, Yuankai Zhang, et al. “DeDoS: Defusing DoS with Dispersion Oriented Software.” In Annual Computer Security Applications Conference (ACSAC), 2018.
    [details]
  2. Mani, Akshaya, Tavish Vaidya, David Dworken, and Micah Sherr. “An Extensive Evaluation of the Internet’s Open Proxies.” In Annual Computer Security Applications Conference (ACSAC), 2018.
    [paper]
    [details]
  3. Ujcich, Benjamin E., Samuel Jero, Anne Edmundson, Qi Wang, Richard Skowyra, James Landry, Adam Bates, William H. Sanders, Cristina Nita-Rotaru, and Hamed Okhravi. “Cross-App Poisoning in Software-Defined Networking.” In ACM Conference on Computer and Communications Security (CCS), 648–63. ACM, 2018.
    [details]
  4. Mani, Akshaya, T Wilson Brown, Rob Jansen, Aaron Johnson, and Micah Sherr. “Understanding Tor Usage with Privacy-Preserving Measurement.” In ACM SIGCOMM Conference on Internet Measurement (IMC), 2018.
    [details]
  5. Wails, Ryan, Yixin Sun, Aaron Johnson, Mung Chiang, and Prateek Mittal. “Tempest: Temporal Dynamics in Anonymity Systems.” Proceedings on Privacy Enhancing Technologies 2018, no. 3 (2018): 22–42.
    [details]
  6. Wahby, Riad S., Ioanna Tzialla, Abhi Shelat, Justin Thaler, and Michael Walfish. “Doubly-Efficient ZkSNARKs Without Trusted Setup.” In IEEE Symposium on Security and Privacy, 2018.
    [details]
  7. Jansen, Rob, Matthew Traudt, John Geddes, Chris Wacek, Micah Sherr, and Paul Syverson. “KIST: Kernel-Informed Socket Transport for Tor.” ACM Transactions on Privacy and Security (TOPS), 2018.
    [details]
  8. Gade, Shripad, and Nitin H. Vaidya. “Private Optimization on Networks.” In Annual American Control Conference (ACC). IEEE, 2018.
    [details]
  9. ———. “Privacy-Preserving Distributed Learning via Obfuscated Stochastic Gradients.” In 57th IEEE Conference on Decision and Control (CDC), 2018.
    [details]

2017

  1. Fenske, Ellis, Akshaya Mani, Aaron Johnson, and Micah Sherr. “Distributed Measurement with Private Set-Union Cardinality.” In ACM Conference on Computer and Communications Security (CCS), 2017.
    [paper]
    [details]
  2. Sherr, Micah. “Testimony to the Maryland Joint Committee Hearing on Election Cybersecurity. House Ways and Means Committee and the Senate Education, Health, and Environmental Affairs Committee, Maryland State Legislature,” September 6, 2017.
    [details]
  3. Vaidya, Tavish, Eric Burger, Micah Sherr, and Clay Shields. “Where Art Thou, Eve? Experiences Laying Traps for Internet Eavesdroppers.” In USENIX Workshop on Cyber Security Experimentation and Test (CSET), 2017.
    [details]
  4. Demoulin, Henri Maxime, Tavish Vaidya, Isaac Pedisich, Nik Sultana, Yuankai Zhang, Ang Chen, Andreas Haeberlen, et al. “A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers (Demo).” In Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), 2017.
    [details]
  5. Ujcich, Benjamin E., Andrew Miller, Adam Bates, and William H. Sanders. “Towards an Accountable Software-Defined Networking Architecture.” In IEEE Conference on Network Softwarization (NetSoft), 1–5. IEEE, 2017.
    [details]
  6. Ujcich, Benjamin E., Uttam Thakore, and William H. Sanders. “ATTAIN: An Attack Injection Framework for Software-Defined Networking.” In IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 567–78. IEEE, 2017.
    [details]
  7. Mani, Akshaya, and Micah Sherr. “Historε: Differentially Private and Robust Statistics Collection for Tor.” In Network and Distributed System Security Symposium (NDSS), 2017.
    [paper]
    [details]
  8. Wahby, Riad S., Ye Ji, Andrew J. Blumberg, Abhi Shelat, Justin Thaler, Michael Walfish, and Thomas Wies. “Full Accounting for Verifiable Outsourcing.” In Conference on Computer and Communications Security (CCS), 2017.
    [details]
  9. Bouland, Adam, Lijie Chen, Dhiraj Holden, Justin Thaler, and Prashant Nalini Vasudevan. “On the Power of Statistical Zero Knowledge.” In Annual Symposium on Foundations of Computer Science (FOCS), 2017.
    [details]
  10. Zhang, Yuankai, Adam O’Neill, Micah Sherr, and Wenchao Zhou. “Privacy-Preserving Network Provenance.” Proceedings of the VLDB Endowment (PVLDB), 2017.
    [details]
  11. Sato, Masashi, and Shin’ichiro Matsuo. “Long-Term Public Blockchain: Resilience against Compromise of Underlying Cryptography.” In 2017 26th International Conference on Computer Communications and Networks, ICCCN 2017, 2017. https://doi.org/10.1109/ICCCN.2017.8038516.
    [details]

2016

  1. Chen, Ang, Akshay Sriraman, Tavish Vaidya, Yuankai Zhang, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, and Wenchao Zhou. “Dispersing Asymmetric DDoS Attacks with SplitStack.” In ACM Workshop on Hot Topics in Networks (HotNets), 2016.
    [details]
  2. Sheridan, Brendan, and Micah Sherr. “On Manufacturing Resilient Opaque Constructs Against Static Analysis.” In European Symposium on Research in Computer Security (ESORICS), 2016.
    [details]
  3. Carlini, Nicholas, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. “Hidden Voice Commands.” In USENIX Security Symposium (USENIX), 2016.
    [details]
  4. Tan, Henry, Micah Sherr, and Wenchao Zhou. “Data-Plane Defenses against Routing Attacks on Tor.” In Privacy Enhancing Technologies Symposium (PETS), 4:276–93, 2016.
    [details]
  5. Lin, Dong, Micah Sherr, and Boon Thau Loo. “Scalable and Anonymous Group Communication with MTor.” Proceedings on Privacy Enhancing Technologies (PoPETS), 2016.
    [paper]
    [details]

2015

  1. Singh, Lisa, Grace Hui Yang, Micah Sherr, Andrew Hian-Cheong, Kevin Tian, Janet Zhu, and Sicong Zhang. “Public Information Exposure Detection: Helping Users Understand Their Web Footprints.” In IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2015.
    [details]
  2. Vaidya, Tavish, Yuankai Zhang, Micah Sherr, and Clay Shields. “Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition.” In USENIX Workshop on Offensive Technologies (WOOT), 2015.
    [paper]
    [details]
  3. Vaidya, Tavish, and Micah Sherr. “Mind Your (R, Φ)s: Location-Based Privacy Controls for Consumer Drones.” In Security Protocols Workshop, 2015.
    [details]
  4. Moore, W. Brad, Henry Tan, Micah Sherr, and Marcus A. Maloof. “Multi-Class Traffic Morphing for Encrypted VoIP Communication.” In Financial Cryptography and Data Security (FC), 2015.
    [paper]
    [details]
  5. Zhao, Mingchen, Wenchao Zhou, Alexander Gurney, Andreas Haeberlen, Micah Sherr, and Boon Thau Loo. “Private and Verifiable Interdomain Routing Decisions.” IEEE/ACM Transactions on Networking, 2015.
    [details]
  6. Vaidya, Tavish, Eric Burger, Micah Sherr, and Clay Shields. “Studying the Pervasiveness of Internet Interception with Honey{POP,SMTP,Telnet}. (Poster).” In USENIX Security Symposium (USENIX), 2015.
    [details]
  7. Bates, Adam, Kevin Butler, Micah Sherr, Clay Shields, Patrick Traynor, and Dan Wallach. “Accountable Wiretapping -or- I Know They Can Hear You Now.” Journal of Computer Security, 2015.
    [details]

2014

  1. Tan, Henry, Chris Wacek, Calvin Newport, and Micah Sherr. “A Disruption-Resistant MAC Layer for Multichannel Wireless Networks.” In International Conference on Principles of Distributed Systems (OPODIS), 2014.
    [details]
  2. Chen, Ang, W. Brad Moore, Hanjun Xiao, Andreas Haeberlen, Linh Thi Xuan Phan, Micah Sherr, and Wenchao Zhou. “Detecting Covert Timing Channels with Time-Deterministic Replay.” In USENIX Symposium on Operating System Design and Implementation (OSDI), 2014.
    [paper]
    [details]
  3. Jansen, Rob, John Geddes, Chris Wacek, Micah Sherr, and Paul Syverson. “Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport.” In USENIX Security Symposium (USENIX), 2014.
    [paper]
    [details]
  4. Fineman, Jeremy, Calvin Newport, Micah Sherr, and Tonghe Wang. “Fair Maximal Independent Sets.” In IEEE International Parallel & Distributed Processing Symposium (IPDPS), 2014.
    [paper]
    [details]
  5. Tan, Henry, and Micah Sherr. “Censorship Resistance as a Side-Effect.” In International Workshop on Security Protocols, 2014.
    [paper]
    [details]
  6. Sherr, Micah, Harjot Gill, Taher Aquil Saeed, Andrew Mao, William R. Marczak, Saravana Soundararajan, Wenchao Zhou, Boon Thau Loo, and Matt Blaze. “The Design and Implementation of the A^3 Application-Aware Anonymity Platform.” Elsevier Computer Networks 58 (February 2014): 206–27.
    [details]
  7. Bates, Adam, Kevin Butler, Andreas Haeberlen, Micah Sherr, and Wenchao Zhou. “Let SDN Be Your Eyes: Secure Forensics in Data Center Networks.” In Workshop on Security of Emerging Networking Technologies (SENT), 2014.
    [details]
  8. Aviv, Adam J, Matt Blaze, Micah Sherr, and Jonathan M Smith. “Privacy-Aware Message Exchanges for HumaNets.” Computer Communications 48 (2014): 30–43.
    [details]
  9. Chandrasekaran, Karthekeyan, Justin Thaler, Jonathan Ullman, and Andrew Wan. “Faster Private Release of Marginals on Small Databases.” In Innovations in Theoretical Computer Science (ITCS), 2014.
    [details]

2013

  1. Wilberding, Jordan, Andrew Yates, Micah Sherr, and Wenchao Zhou. “Validating Web Content with Senser.” In Annual Computer Security Applications Conference (ACSAC), 2013.
    [paper]
    [details]
  2. Johnson, Aaron, Chris Wacek, Rob Jansen, Micah Sherr, and Paul Syverson. “Users Get Routed: Traffic Correlation on Tor By Realistic Adversaries.” In ACM Conference on Computer and Communications Security (CCS), 2013.
    [details]
  3. Zhou, Wenchao, Suyog Mapara, Yiqing Ren, Yang Li, Andreas Haeberlen, Zachary Ives, Boon Thau Loo, and Micah Sherr. “Distributed Time-Aware Provenance.” In International Conference on Very Large Data Bases (VLDB), 2013.
    [details]
  4. Ferro, John, Lisa Singh, and Micah Sherr. “Identifying Individual Vulnerability Based on Public Data.” In International Conference on Privacy, Security and Trust (PST), 2013.
    [paper]
    [details]
  5. Adida, Ben, Collin Anderson, Annie I. Anton, Matt Blaze, Roger Dingledine, Edward W. Felten, Matthew D. Green, et al. “CALEA II: Risks of Wiretap Modifications to Endpoints,” May 2013. https://security.cs.georgetown.edu/ msherr/papers/CALEAII-techreport.pdf.
    [details]
  6. Wacek, Chris, Henry Tan, Kevin Bauer, and Micah Sherr. “An Empirical Evaluation of Relay Selection in Tor.” In Network and Distributed System Security Symposium (NDSS), 2013.
    [details]
  7. Thaler, Justin. “Time-Optimal Interactive Proofs for Circuit Evaluation.” In Advances in Cryptology - CRYPTO, 2013.
    [details]
  8. Moore, W. Brad, Yifang Wei, Adam Orshefsky, Micah Sherr, Lisa Singh, and Hui Yang. “Understanding Site-Based Inference Potential for Identifying Hidden Attributes.” In ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), 2013.
    [details]

2012

  1. Clark, Sandy, Chris Wacek, Matt Blaze, Boon Thau Loo, Micah Sherr, Clay Shields, and Jonathan Smith. “Collaborative Red Teaming for Anonymity System Evaluation.” In USENIX Workshop on Cyber Security Experimentation and Test (CSET), 2012.
    [details]
  2. Zhao, Mingchen, Wenchao Zhou, Alexander Gurney, Andreas Haeberlen, Micah Sherr, and Boon Thau Loo. “Private and Verifiable Interdomain Routing Decisions.” In Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), 2012.
    [paper]
    [details]
  3. Bates, Adam, Kevin Butler, Micah Sherr, Clay Shields, Patrick Traynor, and Dan Wallach. “Accountable Wiretapping -or- I Know They Can Hear You Now.” In Network and Distributed System Security Symposium (NDSS), 2012.
    [paper]
    [details]
  4. Haeberlen, Andreas, Mingchen Zhao, Wenchao Zhou, Alexander Gurney, Micah Sherr, and Boon Thau Loo. “Privacy-Preserving Collaborative Verification Protocols.” In Workshop on Large-Scale Distributed Systems and Middleware (LADIS), 2012.
    [details]
  5. Loo, Boon Thau, Harjot Gill, Changbin Liu, Yun Mao, William R. Marczak, Micah Sherr, Anduo Wang, and Wenchao Zhou. “Recent Advances in Declarative Networking (Invited Paper).” In International Symposium on Practical Aspects of Declarative Languages (PADL), 2012.
    [details]
  6. Tan, Henry, Nazli Goharian, and Micah Sherr. “$100,000 Prize Jackpot. Call Now! Identifying the Pertinent Features of SMS Spam (Poster).” In ACM Conference on Research and Development in Information Retrieval (SIGIR), 2012.
    [details]
  7. Aviv, Adam J., Micah Sherr, Matt Blaze, and Jonathan M. Smith. “Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks.” In European Symposium on Research in Computer Security (ESORICS), 2012.
    [details]
  8. Thaler, Justin, Jonathan Ullman, and Salil P. Vadhan. “Faster Algorithms for Privately Releasing Marginals.” In Automata, Languages, and Programming (ICALP), 2012.
    [details]
  9. Cormode, Graham, Michael Mitzenmacher, and Justin Thaler. “Practical Verified Computation with Streaming Interactive Proofs.” In Innovations in Theoretical Computer Science (ITCS), 2012.
    [details]

2011

  1. Moore, Brad, Chris Wacek, and Micah Sherr. “Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race with Tortoise.” In Annual Computer Security Applications Conference (ACSAC), 2011.
    [paper]
    [details]
  2. Zhou, Wenchao, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr. “Secure Network Provenance.” In ACM Symposium on Operating Systems Principles (SOSP), 2011.
    [details]
  3. Bauer, Kevin, Micah Sherr, Damon McCoy, and Dirk Grunwald. “ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation.” In USENIX Workshop on Cyber Security Experimentation and Test (CSET), 2011.
    [paper]
    [details]
  4. Zhou, Wenchao, Qiong Fei, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr. “Towards Self-Explaining Networks.” In Future Internet Workshop (FIW), 2011.
    [details]
  5. Zhou, Wenchao, Qiong Fei, Sandy Sun, Tao Tao, Andreas Haeberlen, Zachary Ives, Boon Thau Loo, and Micah Sherr. “NetTrails: A Declarative Platform for Provenance Maintenance and Querying in Distributed Systems (Demo).” In ACM SIGMOD International Conference on Management of Data (SIGMOD), 2011.
    [details]
  6. Gurney, Alexander J.T., Andreas Haeberlen, Wenchao Zhou, Micah Sherr, and Boon Thau Loo. “Having Your Cake and Eating It Too: Routing Security with Privacy Protections.” In ACM Workshop on Hot Topics in Networks (HotNets), 2011.
    [details]

2010

  1. Sherr, Micah. Eavesdropping. Edited by Henk C.A. van Tilborg and Sushil Jajodia. Encyclopedia of Cryptography and Security (2nd Ed.). Springer, 2010.
    [details]
  2. Aviv, Adam J., Micah Sherr, Matt Blaze, and Jonathan M. Smith. “Evading Cellular Data Monitoring with Human Movement Networks.” In USENIX Workshop on Hot Topics in Security (HotSec), 2010.
    [details]
  3. Zhou, Wenchao, Micah Sherr, Tao Tao, Xiaozhou Li, Boon Thau Loo, and Yun Mao. “Efficient Querying and Maintenance of Network Provenance at Internet-Scale.” In ACM SIGMOD International Conference on Management of Data (SIGMOD), 2010.
    [details]
  4. Marczak, William, Shan Shan Huang, Martin Bravenboer, Micah Sherr, Boon Thau Loo, and Molham Aref. “SecureBlox: Customizable Secure Distributed Data Processing.” In ACM SIGMOD International Conference on Management of Data (SIGMOD), 2010.
    [paper]
    [details]
  5. Zhou, Wenchao, Micah Sherr, William R. Marczak, Zhuoyao Zhang, Tao Tao, Boon Thau Loo, and Insup Lee. “Towards a Data-Centric View of Cloud Security.” In International Workshop on Cloud Data Management (CloudDB), 2010.
    [details]
  6. Sherr, Micah, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo, and Matt Blaze. “A3: An Extensible Platform for Application-Aware Anonymity.” In Network and Distributed System Security Symposium (NDSS), 2010.
    [paper]
    [details]