Micah Sherr

Micah Sherr

Callahan Family Professor of Computer Science

Department of Computer Science

Georgetown University  • Washington, DC

Publications

These papers are made available to facilitate timely dissemination of scholarly and technical work on a non-commercial basis. Please respect the rights of the copyright holder(s) and do not repost without their explicit permission.

The publications listed below are fetched periodically from dblp. For the most up-to-date and complete list, please see my C.V. Please report errors or omissions to msherr@cs.georgetown.edu.

2025

  1. SCIF: Privacy-Preserving Statistics Collection with Input Validation and Full Security
    Jianan Su, Laasya Bangalore, Harel Berger, Jason Yi, Sophia Castor, Micah Sherr, Muthuramakrishnan Venkitasubramaniam
    Proc. Priv. Enhancing Technol.  — 2025
    Details
  2. Censorship Evasion with Unidentified Protocol Generation
    Ryan Wails, Rob Jansen, Aaron Johnson, Micah Sherr
    34th USENIX Security Symposium, USENIX Security 2025, Seattle, WA, USA, August 13-15, 2025  — 2025
    Details

2024

  1. "Modern problems require modern solutions": Community-Developed Techniques for Online Exam Proctoring Evasion
    Lucy Simko, Adryana Hutchinson, Alvin Isaac, Evan Fries, Micah Sherr, Adam J. Aviv
    Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024  — 2024
    Details
  2. On Precisely Detecting Censorship Circumvention in Real-World Networks
    Ryan Wails, George Arnold Sullivan, Micah Sherr, Rob Jansen
    31st Annual Network and Distributed System Security Symposium, NDSS 2024, San Diego, California, USA, February 26 - March 1, 2024  — 2024
    Details
  3. You Can Find Me Here: A Study of the Early Adoption of Geofeeds
    Rahel A. Fainchtein, Micah Sherr
    Passive and Active Measurement - 25th International Conference, PAM 2024, Virtual Event, March 11-13, 2024, Proceedings, Part II  — 2024
    Details
  4. "I can say I’m John Travolta...but I’m not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified Accounts
    Carson Powers, Nickolas Gravel, Christopher Pellegrini, Micah Sherr, Michelle L. Mazurek, Daniel Votipka
    Twentieth Symposium on Usable Privacy and Security, SOUPS 2024, Philadelphia, PA, USA, August 11-13, 2024  — 2024
    Details
  5. NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge
    Patrick Tser Jern Kon, Aniket Gattani, Dhiraj Saharia, Tianyu Cao, Diogo Barradas, Ang Chen, Micah Sherr, Benjamin E. Ujcich
    IEEE Symposium on Security and Privacy, SP 2024, San Francisco, CA, USA, May 19-23, 2024  — 2024
    Details
  6. SpotProxy: Rediscovering the Cloud for Censorship Circumvention
    Patrick Tser Jern Kon, Sina Kamali, Jinyu Pei, Diogo Barradas, Ang Chen, Micah Sherr, Moti Yung
    33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024  — 2024
    Details
  7. SCIF: Privacy-Preserving Statistics Collection with Input Validation and Full Security
    Jianan Su, Laasya Bangalore, Harel Berger, Jason Yi, Alivia Castor, Micah Sherr, Muthuramakrishnan Venkitasubramaniam
    IACR Cryptol. ePrint Arch.  — 2024
    Details

2023

  1. Cadence: A Simulator for Human Movement-based Communication Protocols
    Harel Berger, Micah Sherr, Adam J. Aviv
    2023 Cyber Security Experimentation and Test Workshop, CSET 2023, Marina del Rey, CA, USA, August 7-8, 2023  — 2023
    Details
  2. Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring
    David G. Balash, Elena Korkes, Miles Grant, Adam J. Aviv, Rahel A. Fainchtein, Micah Sherr
    32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023  — 2023
    Details

2022

  1. Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs
    Ryan Wails, Andrew Stange, Eliana Troper, Aylin Caliskan, Roger Dingledine, Rob Jansen, Micah Sherr
    Proc. Priv. Enhancing Technol.  — 2022
    Details
  2. Accountable Private Set Cardinality for Distributed Measurement
    Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr
    ACM Trans. Priv. Secur.  — 2022
    Details
  3. User Perceptions of the Privacy and Usability of Smart DNS
    Rahel A. Fainchtein, Adam J. Aviv, Micah Sherr
    Annual Computer Security Applications Conference, ACSAC 2022, Austin, TX, USA, December 5-9, 2022  — 2022
    Details

2021

  1. Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services
    Rahel A. Fainchtein, Adam J. Aviv, Micah Sherr, Stephen Ribaudo, Armaan Khullar
    Proc. Priv. Enhancing Technol.  — 2021
    Details
  2. Residue-Free Computing
    Logan Arkema, Micah Sherr
    Proc. Priv. Enhancing Technol.  — 2021
    Details
  3. Examining the Examiners: Students’ Privacy and Security Perceptions of Online Proctoring Services
    David G. Balash, Dongkun Kim, Darikia Shaibekova, Rahel A. Fainchtein, Micah Sherr, Adam J. Aviv
    Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021  — 2021
    Details

2020

  1. Bypassing Tor Exit Blocking with Exit Bridge Onion Services
    Zhao Zhang, Wenchao Zhou, Micah Sherr
    CCS ’20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020  — 2020
    Details
  2. Ephemeral Exit Bridges for Tor
    Zhao Zhang, Tavish Vaidya, Kartik Subramanian, Wenchao Zhou, Micah Sherr
    50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2020, Valencia, Spain, June 29 - July 2, 2020  — 2020
    Details

2019

  1. KIST: Kernel-Informed Socket Transport for Tor
    Rob Jansen, Matthew Traudt, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson
    ACM Trans. Priv. Secur.  — 2019
    Details
  2. Whisper: a unilateral defense against VoIP traffic re-identification attacks
    Tavish Vaidya, Timothy Walsh, Micah Sherr
    Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, PR, USA, December 09-13, 2019  — 2019
    Details
  3. Does Being Verified Make You More Credible?: Account Verification’s Effect on Tweet Credibility
    Tavish Vaidya, Daniel Votipka, Michelle L. Mazurek, Micah Sherr
    Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI 2019, Glasgow, Scotland, UK, May 04-09, 2019  — 2019
    Details
  4. You Talk Too Much: Limiting Privacy Exposure Via Voice Input
    Tavish Vaidya, Micah Sherr
    2019 IEEE Security and Privacy Workshops, SP Workshops 2019, San Francisco, CA, USA, May 19-23, 2019  — 2019
    Details
  5. Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor
    Rob Jansen, Tavish Vaidya, Micah Sherr
    28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019  — 2019
    Details

2018

  1. An Extensive Evaluation of the Internet’s Open Proxies
    Akshaya Mani, Tavish Vaidya, David Dworken, Micah Sherr
    Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018  — 2018
    Details
  2. DeDoS: Defusing DoS with Dispersion Oriented Software
    Henri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Bob DiMaiolo, Jingyu Qian, Chirag Shah, Yuankai Zhang, Ang Chen, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou
    Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018  — 2018
    Details
  3. Understanding Tor Usage with Privacy-Preserving Measurement
    Akshaya Mani, T. Wilson-Brown, Rob Jansen, Aaron Johnson, Micah Sherr
    Proceedings of the Internet Measurement Conference 2018, IMC 2018, Boston, MA, USA, October 31 - November 02, 2018  — 2018
    Details

2017

  1. Privacy-preserving Network Provenance
    Yuankai Zhang, Adam O’Neill, Micah Sherr, Wenchao Zhou
    Proc. VLDB Endow.  — 2017
    Details
  2. Distributed Measurement with Private Set-Union Cardinality
    Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr
    Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017  — 2017
    Details
  3. HisTor\(ε\): Differentially Private and Robust Statistics Collection for Tor
    Akshaya Mani, Micah Sherr
    24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017  — 2017
    Details
  4. A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers
    Henri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Nik Sultana, Bowen Wang, Jingyu Qian, Yuankai Zhang, Ang Chen, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou
    Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, SIGCOMM 2017, Los Angeles, CA, USA, August 21-25, 2017  — 2017
    Details
  5. Where art thou, Eve? Experiences laying traps for Internet eavesdroppers
    Tavish Vaidya, Eric William Burger, Micah Sherr, Clay Shields
    10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017  — 2017
    Details

2016

  1. Scalable and Anonymous Group Communication with MTor
    Dong Lin, Micah Sherr, Boon Thau Loo
    Proc. Priv. Enhancing Technol.  — 2016
    Details
  2. Data-plane Defenses against Routing Attacks on Tor
    Henry Tan, Micah Sherr, Wenchao Zhou
    Proc. Priv. Enhancing Technol.  — 2016
    Details
  3. Private and Verifiable Interdomain Routing Decisions
    Mingchen Zhao, Wenchao Zhou, Alexander J. T. Gurney, Andreas Haeberlen, Micah Sherr, Boon Thau Loo
    IEEE/ACM Trans. Netw.  — 2016
    Details
  4. Generating risk reduction recommendations to decrease vulnerability of public online profiles
    Janet Zhu, Sicong Zhang, Lisa Singh, Grace Hui Yang, Micah Sherr
    2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016, San Francisco, CA, USA, August 18-21, 2016  — 2016
    Details
  5. On Manufacturing Resilient Opaque Constructs Against Static Analysis
    Brendan Sheridan, Micah Sherr
    Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II  — 2016
    Details
  6. Dispersing Asymmetric DDoS Attacks with SplitStack
    Ang Chen, Akshay Sriraman, Tavish Vaidya, Yuankai Zhang, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou
    Proceedings of the 15th ACM Workshop on Hot Topics in Networks, HotNets 2016, Atlanta, GA, USA, November 9-10, 2016  — 2016
    Details
  7. Hidden Voice Commands
    Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David A. Wagner, Wenchao Zhou
    25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016  — 2016
    Details

2015

  1. Accountable wiretapping - or - I know they can hear you now
    Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach
    J. Comput. Secur.  — 2015
    Details
  2. Public Information Exposure Detection: Helping Users Understand Their Web Footprints
    Lisa Singh, Grace Hui Yang, Micah Sherr, Andrew Hian-Cheong, Kevin Tian, Janet Zhu, Sicong Zhang
    Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015, Paris, France, August 25 - 28, 2015  — 2015
    Details
  3. Multi-class Traffic Morphing for Encrypted VoIP Communication
    W. Brad Moore, Henry Tan, Micah Sherr, Marcus A. Maloof
    Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers  — 2015
    Details
  4. Mind Your (R, }varPhi ) s: Location-Based Privacy Controls for Consumer Drones
    Tavish Vaidya, Micah Sherr
    Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers  — 2015
    Details
  5. Mind Your (R, }varPhi ) s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion)
    Tavish Vaidya, Micah Sherr
    Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers  — 2015
    Details
  6. Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition
    Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields
    9th USENIX Workshop on Offensive Technologies, WOOT ’15, Washington, DC, USA, August 10-11, 2015  — 2015
    Details
  7. Helping Users Understand Their Web Footprints
    Lisa Singh, Grace Hui Yang, Micah Sherr, Yifang Wei, Andrew Hian-Cheong, Kevin Tian, Janet Zhu, Sicong Zhang, Tavish Vaidya, Elchin Asgarli
    Proceedings of the 24th International Conference on World Wide Web Companion, WWW 2015, Florence, Italy, May 18-22, 2015 - Companion Volume  — 2015
    Details

2014

  1. The design and implementation of the A\(^\mbox3\)application-aware anonymity platform
    Micah Sherr, Harjot Gill, Taher Saeed, Andrew Mao, William R. Marczak, Saravana Soundararajan, Wenchao Zhou, Boon Thau Loo, Matt Blaze
    Comput. Networks  — 2014
    Details
  2. Privacy-aware message exchanges for HumaNets
    Adam J. Aviv, Matt Blaze, Micah Sherr, Jonathan M. Smith
    Comput. Commun.  — 2014
    Details
  3. Fair Maximal Independent Sets
    Jeremy T. Fineman, Calvin C. Newport, Micah Sherr, Tonghe Wang
    2014 IEEE 28th International Parallel and Distributed Processing Symposium, Phoenix, AZ, USA, May 19-23, 2014  — 2014
    Details
  4. A Disruption-Resistant MAC Layer for Multichannel Wireless Networks
    Henry Tan, Chris Wacek, Calvin C. Newport, Micah Sherr
    Principles of Distributed Systems - 18th International Conference, OPODIS 2014, Cortina d’Ampezzo, Italy, December 16-19, 2014. Proceedings  — 2014
    Details
  5. Detecting Covert Timing Channels with Time-Deterministic Replay
    Ang Chen, W. Brad Moore, Hanjun Xiao, Andreas Haeberlen, Linh Thi Xuan Phan, Micah Sherr, Wenchao Zhou
    11th USENIX Symposium on Operating Systems Design and Implementation, OSDI ’14, Broomfield, CO, USA, October 6-8, 2014  — 2014
    Details
  6. Censorship Resistance as a Side-Effect
    Henry Tan, Micah Sherr
    Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers  — 2014
    Details
  7. Censorship Resistance as a Side-Effect (Transcript of Discussion)
    Henry Tan, Micah Sherr
    Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers  — 2014
    Details
  8. Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport
    Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul F. Syverson
    Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014  — 2014
    Details
  9. Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014
     — 2014
    Details

2013

  1. Validating web content with senser
    Jordan Wilberding, Andrew Yates, Micah Sherr, Wenchao Zhou
    Annual Computer Security Applications Conference, ACSAC ’13, New Orleans, LA, USA, December 9-13, 2013  — 2013
    Details
  2. Users get routed: traffic correlation on tor by realistic adversaries
    Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, Paul F. Syverson
    2013 ACM SIGSAC Conference on Computer and Communications Security, CCS’13, Berlin, Germany, November 4-8, 2013  — 2013
    Details
  3. An Empirical Evaluation of Relay Selection in Tor
    Chris Wacek, Henry Tan, Kevin S. Bauer, Micah Sherr
    20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013  — 2013
    Details
  4. Identifying individual vulnerability based on public data
    John Ferro, Lisa Singh, Micah Sherr
    Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013  — 2013
    Details
  5. Understanding Site-Based Inference Potential for Identifying Hidden Attributes
    W. Brad Moore, Yifang Wei, Adam Orshefsky, Micah Sherr, Lisa Singh, Hui Yang
    International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013  — 2013
    Details
  6. 6th Workshop on Cyber Security Experimentation and Test, CSET ’13, Washington, D.C., USA, August 12, 2013
     — 2013
    Details

2012

  1. Distributed Time-aware Provenance
    Wenchao Zhou, Suyog Mapara, Yiqing Ren, Yang Li, Andreas Haeberlen, Zachary G. Ives, Boon Thau Loo, Micah Sherr
    Proc. VLDB Endow.  — 2012
    Details
  2. Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks
    Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith
    Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings  — 2012
    Details
  3. Accountable Wiretapping -or- I know they can hear you now
    Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach
    19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5-8, 2012  — 2012
    Details
  4. Recent Advances in Declarative Networking
    Boon Thau Loo, Harjot Gill, Changbin Liu, Yun Mao, William R. Marczak, Micah Sherr, Anduo Wang, Wenchao Zhou
    Practical Aspects of Declarative Languages - 14th International Symposium, PADL 2012, Philadelphia, PA, USA, January 23-24, 2012. Proceedings  — 2012
    Details
  5. Private and verifiable interdomain routing decisions
    Mingchen Zhao, Wenchao Zhou, Alexander J. T. Gurney, Andreas Haeberlen, Micah Sherr, Boon Thau Loo
    ACM SIGCOMM 2012 Conference, SIGCOMM ’12, Helsinki, Finland - August 13 - 17, 2012  — 2012
    Details
  6. \textdollar100, 000 prize jackpot. call now!: identifying the pertinent features of SMS spam
    Henry Tan, Nazli Goharian, Micah Sherr
    The 35th International ACM SIGIR conference on research and development in Information Retrieval, SIGIR ’12, Portland, OR, USA, August 12-16, 2012  — 2012
    Details
  7. Collaborative Red Teaming for Anonymity System Evaluation
    Sandy Clark, Chris Wacek, Matt Blaze, Boon Thau Loo, Micah Sherr, Clay Shields, Jonathan M. Smith
    5th Workshop on Cyber Security Experimentation and Test, CSET ’12, Bellevue, WA, USA, August 6, 2012  — 2012
    Details

2011

  1. Exploring the potential benefits of expanded rate limiting in Tor: slow and steady wins the race with Tortoise
    W. Brad Moore, Chris Wacek, Micah Sherr
    Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011  — 2011
    Details
  2. Having your cake and eating it too: routing security with privacy protections
    Alexander J. T. Gurney, Andreas Haeberlen, Wenchao Zhou, Micah Sherr, Boon Thau Loo
    Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), HOTNETS ’11, Cambridge, MA, USA - November 14 - 15, 2011  — 2011
    Details
  3. NetTrails: a declarative platform for maintaining and querying provenance in distributed systems
    Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, Andreas Haeberlen, Zachary G. Ives, Boon Thau Loo, Micah Sherr
    Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2011, Athens, Greece, June 12-16, 2011  — 2011
    Details
  4. Secure network provenance
    Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, Micah Sherr
    Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, SOSP 2011, Cascais, Portugal, October 23-26, 2011  — 2011
    Details
  5. ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation
    Kevin S. Bauer, Micah Sherr, Dirk Grunwald
    4th Workshop on Cyber Security Experimentation and Test, CSET ’11, San Francisco, CA, USA, August 8, 2011  — 2011
    Details
  6. Eavesdropping
    Micah Sherr
    Encyclopedia of Cryptography and Security, 2nd Ed  — 2011
    Details

2010

  1. Towards a data-centric view of cloud security
    Wenchao Zhou, Micah Sherr, William R. Marczak, Zhuoyao Zhang, Tao Tao, Boon Thau Loo, Insup Lee
    Proceedings of the Second International CIKM Workshop on Cloud Data Management, CloudDB 2010, Toronto, Ontario, Canada, October 30, 2010  — 2010
    Details
  2. A3: An Extensible Platform for Application-Aware Anonymity
    Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo, Matt Blaze
    Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, San Diego, California, USA, 28th February - 3rd March 2010  — 2010
    Details
  3. Efficient querying and maintenance of network provenance at internet-scale
    Wenchao Zhou, Micah Sherr, Tao Tao, Xiaozhou Li, Boon Thau Loo, Yun Mao
    Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2010, Indianapolis, Indiana, USA, June 6-10, 2010  — 2010
    Details
  4. SecureBlox: customizable secure distributed data processing
    William R. Marczak, Shan Shan Huang, Martin Bravenboer, Micah Sherr, Boon Thau Loo, Molham Aref
    Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2010, Indianapolis, Indiana, USA, June 6-10, 2010  — 2010
    Details
  5. Evading Cellular Data Monitoring with Human Movement Networks
    Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith
    5th USENIX Workshop on Hot Topics in Security, HotSec’10, Washington, D.C., USA, August 10, 2010  — 2010
    Details

2009

  1. Application containers without virtual machines
    Micah Sherr, Matt Blaze
    Proceedings of the 1st ACM Workshop on Virtual Machine Security, VMSec ’09, Chicago, Illinois, USA, November 9, 2009  — 2009
    Details
  2. Can they hear me now?: a security analysis of law enforcement wiretaps
    Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, Matt Blaze
    Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009  — 2009
    Details
  3. Scalable Link-Based Relay Selection for Anonymous Routing
    Micah Sherr, Matt Blaze, Boon Thau Loo
    Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings  — 2009
    Details
  4. Veracity: Practical Secure Network Coordinates via Vote-based Agreements
    Micah Sherr, Matt Blaze, Boon Thau Loo
    Proceedings of the 2009 USENIX Annual Technical Conference, USENIX ATC 2009, San Diego, CA, USA, June 14-19, 2009  — 2009
    Details

2008

  1. On the (un)reliability of eavesdropping
    Eric Cronin, Micah Sherr, Matt Blaze
    Int. J. Secur. Networks  — 2008
    Details
  2. Veracity: a fully decentralized service for securing network coordinate systems
    Micah Sherr, Boon Thau Loo, Matt Blaze
    Proceedings of the 7th international conference on Peer-to-peer systems, IPTPS’08, Tampa, FL, USA, February 25-26, 2008  — 2008
    Details
  3. Security Evaluation of ES&S Voting Machines and Election Management System
    Adam J. Aviv, Pavol Cerný, Sandy Clark, Eric Cronin, Gaurav Shah, Micah Sherr, Matt Blaze
    2008 USENIX/ACCURATE Electronic Voting Workshop, EVT 2008, July 28-29, 2008, San Jose, CA, USA, Proceedings  — 2008
    Details

2007

  1. Measurable Security through Isotropic Channels
    Micah Sherr, Eric Cronin, Matt Blaze
    Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers  — 2007
    Details
  2. Measurable Security through Isotropic Channels (Transcript of Discussion)
    Micah Sherr
    Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers  — 2007
    Details
  3. Towards Application-Aware Anonymous Routing
    Micah Sherr, Boon Thau Loo, Matt Blaze
    2nd USENIX Workshop on Hot Topics in Security, HotSec’07, Boston, MA, USA, August 7, 2007  — 2007
    Details

2006

  1. On the Reliability of Network Eavesdropping Tools
    Eric Cronin, Micah Sherr, Matt Blaze
    Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29 - February 1, 2006  — 2006
    Details
  2. Sensor Network Security: More Interesting Than You Think
    Madhukar Anand, Eric Cronin, Micah Sherr, Zachary G. Ives, Insup Lee
    1st USENIX Workshop on Hot Topics in Security, HotSec’06, Vancouver, BC, Canada, July 31, 2006  — 2006
    Details
  3. Security Protocols with Isotropic Channels
    Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, Sampath Kannan
    IACR Cryptol. ePrint Arch.  — 2006
    Details

2005

  1. Signaling Vulnerabilities in Wiretapping Systems
    Micah Sherr, Eric Cronin, Sandy Clark, Matt Blaze
    IEEE Secur. Priv.  — 2005
    Details
  2. Listen Too Closely and You May Be Confused
    Eric Cronin, Micah Sherr, Matt Blaze
    Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers  — 2005
    Details

2002

  1. Metadata tables to enable dynamic data modeling and web interface design: the SEER example
    Mark G. Weiner, Micah Sherr, Abigail Cohen
    Int. J. Medical Informatics  — 2002
    Details

2001

  1. Metadata Tables to Enable Dynamic Data Modeling and Web Interface Design: The SEER Example
    Mark G. Weiner, Micah Sherr, Abigail Cohen
    AMIA 2001, American Medical Informatics Association Annual Symposium, Washington, DC, USA, November 3-7, 2001  — 2001
    Details