Publications

The papers referenced on this page are included as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Please respect the rights of the copyright holder(s), and do not repost the works without their explicit permission.

 

Peer Reviewed

Akshaya Mani and Micah Sherr. Historε: Differentially Private and Robust Statistics Collection for Tor. In Network and Distributed System Security Symposium (NDSS), February 2017. [ bib | .pdf | Abstract ]

Ang Chen, Akshay Sriraman, Tavish Vaidya, Yuankai Zhang, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, and Wenchao Zhou. Dispersing Asymmetric DDoS Attacks with SplitStack. In ACM Workshop on Hot Topics in Networks (HotNets), November 2016. [ bib | .pdf | Abstract ]

Brendan Sheridan and Micah Sherr. On Manufacturing Resilient Opaque Constructs Against Static Analysis. In European Symposium on Research in Computer Security (ESORICS), September 2016. [ bib | .pdf | Abstract ]

Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. Hidden Voice Commands. In USENIX Security Symposium (Security), August 2016. [ bib | .pdf | Abstract ]

Henry Tan, Micah Sherr, and Wenchao Zhou. Data-plane Defenses against Routing Attacks on Tor. Proceedings on Privacy Enhancing Technologies (PoPETS), July 2016. [ bib | .pdf | Abstract ]

Dong Lin, Micah Sherr, and Boon Thau Loo. Scalable and Anonymous Group Communication with MTor. Proceedings on Privacy Enhancing Technologies (PoPETS), July 2016. [ bib | .pdf | Abstract ]

Tavish Vaidya, Yuankai Zhang, Micah Sherr, and Clay Shields. Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition. In USENIX Workshop on Offensive Technologies (WOOT), August 2015. [ bib | .pdf | Abstract ]

Lisa Singh, Grace Hui Yang, Micah Sherr, Andrew Hian-Cheong, Kevin Tian, Janet Zhu, and Sicong Zhang. Public Information Exposure Detection: Helping Users Understand Their Web Footprints. In IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), August 2015. [ bib | .pdf | Abstract ]

Tavish Vaidya and Micah Sherr. Mind your (R, Φ)s: Location-Based Privacy Controls for Consumer Drones. In Security Protocols Workshop, March 2015. [ bib | .pdf | Abstract ]

Mingchen Zhao, Wenchao Zhou, Alexander Gurney, Andreas Haeberlen, Micah Sherr, and Boon Thau Loo. Private and Verifiable Interdomain Routing Decisions. IEEE/ACM Transactions on Networking, PP(99), 2015. [ bib | http | Abstract ]

W. Brad Moore, Henry Tan, Micah Sherr, and Marcus A. Maloof. Multi-Class Traffic Morphing for Encrypted VoIP Communication. In Financial Cryptography and Data Security (FC), January 2015. [ bib | .pdf | Abstract ]

Adam Bates, Kevin Butler, Micah Sherr, Clay Shields, Patrick Traynor, and Dan Wallach. Accountable Wiretapping -or- I Know They Can Hear You Now. Journal of Computer Security, 23:167-195, 2015. [ bib | http | Abstract ]

Henry Tan, Chris Wacek, Calvin Newport, and Micah Sherr. A Disruption-Resistant MAC Layer for Multichannel Wireless Networks. In International Conference on Principles of Distributed Systems (OPODIS), December 2014. [ bib | .pdf | Abstract ]

Ang Chen, W. Brad Moore, Hanjun Xiao, Andreas Haeberlen, Linh Thi Xuan Phan, Micah Sherr, and Wenchao Zhou. Detecting Covert Timing Channels with Time-Deterministic Replay. In USENIX Symposium on Operating Systems Design and Implementation (OSDI), October 2014. [ bib | .pdf | Abstract ]

Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, and Paul Syverson. Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport. In USENIX Security Symposium (USENIX), August 2014. [ bib | .pdf | Abstract ]

Adam Aviv, Micah Sherr, Matt Blaze, and Jonathan Smith. Privacy-aware message exchanges for humanets. Elsevier Journal of Computer Communications, 48:30-43, July 2014. [ bib | http | Abstract ]

Jeremy Fineman, Calvin Newport, Micah Sherr, and Tonghe Wang. Fair Maximal Independent Sets. In IEEE International Parallel & Distributed Processing Symposium (IPDPS), May 2014. [ bib | .pdf | Abstract ]

Henry Tan and Micah Sherr. Censorship Resistance as a Side-Effect. In International Workshop on Security Protocols, March 2014. [ bib | .pdf | Abstract ]

Adam Bates, Kevin Butler, Andreas Haeberlen, Micah Sherr, and Wenchao Zhou. Let SDN Be Your Eyes: Secure Forensics in Data Center Networks. In Workshop on Security of Emerging Networking Technologies (SENT), February 2014. [ bib | .pdf | Abstract ]

Micah Sherr, Harjot Gill, Taher Aquil Saeed, Andrew Mao, William R. Marczak, Saravana Soundararajan, Wenchao Zhou, Boon Thau Loo, and Matt Blaze. The Design and Implementation of the A3 Application-Aware Anonymity Platform. Elsevier Computer Networks, 58:206-227, February 2014. [ bib | http | Abstract ]

Jordan Wilberding, Andrew Yates, Micah Sherr, and Wenchao Zhou. Validating Web Content with Senser. In Annual Computer Security Applications Conference (ACSAC), December 2013. [ bib | .pdf | Abstract ]

Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, and Paul Syverson. Users Get Routed: Traffic Correlation on Tor By Realistic Adversaries. In ACM Conference on Computer and Communications Security (CCS), November 2013. [ bib | .pdf | Abstract ]

W. Brad Moore, Yifang Wei, Adam Orshefsky, Micah Sherr, Lisa Singh, and Hui Yang. Understanding Site-Based Inference Potential for Identifying Hidden Attributes. In ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), September 2013. Short paper. [ bib | .pdf | Abstract ]

Wenchao Zhou, Suyog Mapara, Yiqing Ren, Yang Li, Andreas Haeberlen, Zachary Ives, Boon Thau Loo, and Micah Sherr. Distributed Time-aware Provenance. In International Conference on Very Large Data Bases (VLDB), August 2013. [ bib | .pdf | Abstract ]

John Ferro, Lisa Singh, and Micah Sherr. Identifying Individual Vulnerability Based on Public Data. In International Conference on Privacy, Security and Trust (PST), July 2013. [ bib | .pdf | Abstract ]

Chris Wacek, Henry Tan, Kevin Bauer, and Micah Sherr. An Empirical Evaluation of Relay Selection in Tor. In Network and Distributed System Security Symposium (NDSS), February 2013. [ bib | .pdf | Abstract ]

Mingchen Zhao, Wenchao Zhou, Alexander J. T. Gurney, Andreas Haeberlen, Micah Sherr, and Boon Thau Loo. Collaborative Verification with Privacy Guarantees (Poster). In USENIX Symposium on Operating Systems Design and Implementation (OSDI), October 2012. [ bib ]

Adam J. Aviv, Micah Sherr, Matt Blaze, and Jonathan M. Smith. Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks. In European Symposium on Research in Computer Security (ESORICS), September 2012. [ bib | .pdf | Abstract ]

Sandy Clark, Chris Wacek, Matt Blaze, Boon Thau Loo, Micah Sherr, Clay Shields, and Jonathan Smith. Collaborative Red Teaming for Anonymity System Evaluation. In USENIX Workshop on Cyber Security Experimentation and Test (CSET), August 2012. [ bib | .pdf | Abstract ]

Mingchen Zhao, Wenchao Zhou, Alexander Gurney, Andreas Haeberlen, Micah Sherr, and Boon Thau Loo. Private and Verifiable Interdomain Routing Decisions. In Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), August 2012. [ bib | .pdf | Abstract ]

Henry Tan, Nazli Goharian, and Micah Sherr. $100,000 Prize Jackpot. Call Now! Identifying the Pertinent Features of SMS Spam (Poster). In ACM Conference on Research and Development in Information Retrieval (SIGIR), August 2012. [ bib | Abstract ]

Adam Bates, Kevin Butler, Micah Sherr, Clay Shields, Patrick Traynor, and Dan Wallach. Accountable Wiretapping -or- I Know They Can Hear You Now. In Network and Distributed System Security Symposium (NDSS), February 2012. [ bib | .pdf | Abstract ]

Brad Moore, Chris Wacek, and Micah Sherr. Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race With Tortoise. In Annual Computer Security Applications Conference (ACSAC), December 2011. [ bib | .pdf | Abstract ]

Alexander J.T. Gurney, Andreas Haeberlen, Wenchao Zhou, Micah Sherr, and Boon Thau Loo. Having your Cake and Eating it too: Routing Security with Privacy Protections. In ACM Workshop on Hot Topics in Networks (HotNets), November 2011. [ bib | .pdf | Abstract ]

Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr. Secure Network Provenance. In ACM Symposium on Operating Systems Principles (SOSP), October 2011. [ bib | .pdf | Abstract ]

Kevin Bauer, Micah Sherr, Damon McCoy, and Dirk Grunwald. ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation. In USENIX Workshop on Cyber Security Experimentation and Test (CSET), August 2011. [ bib | .pdf | Abstract ]

Wenchao Zhou, Qiong Fei, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr. Towards Self-Explaining Networks. In Future Internet Workshop (FIW), June 2011. [ bib | .pdf | Abstract ]

Wenchao Zhou, Qiong Fei, Sandy Sun, Tao Tao, Andreas Haeberlen, Zachary Ives, Boon Thau Loo, and Micah Sherr. NetTrails: A Declarative Platform for Provenance Maintenance and Querying in Distributed Systems (Demo). In ACM SIGMOD International Conference on Management of Data (SIGMOD), June 2011. [ bib ]

Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr. Secure Forensics without Trusted Components (Poster). In USENIX Symposium on Networked Systems Design and Implementation (NSDI), March 2011. [ bib ]

Wenchao Zhou, Micah Sherr, William R. Marczak, Zhuoyao Zhang, Tao Tao, Boon Thau Loo, and Insup Lee. Towards a Data-centric View of Cloud Security. In International Workshop on Cloud Data Management (CloudDB), October 2010. [ bib | .pdf | Abstract ]

Adam J. Aviv, Micah Sherr, Matt Blaze, and Jonathan M. Smith. Evading Cellular Data Monitoring with Human Movement Networks. In USENIX Workshop on Hot Topics in Security (HotSec), August 2010. Errata available at http://www.cs.georgetown.edu/~msherr/papers/mobibot-errata.pdf. [ bib | .pdf | Abstract ]

Wenchao Zhou, Micah Sherr, Tao Tao, Xiaozhou Li, Boon Thau Loo, and Yun Mao. Efficient Querying and Maintenance of Network Provenance at Internet-Scale. In ACM SIGMOD International Conference on Management of Data (SIGMOD), June 2010. [ bib | .pdf | Abstract ]

William Marczak, Shan Shan Huang, Martin Bravenboer, Micah Sherr, Boon Thau Loo, and Molham Aref. SecureBlox: Customizable Secure Distributed Data Processing. In ACM SIGMOD International Conference on Management of Data (SIGMOD), June 2010. [ bib | .pdf | Abstract ]

Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo, and Matt Blaze. A3: An Extensible Platform for Application-Aware Anonymity. In 17th Annual Network and Distributed System Security Symposium (NDSS), February 2010. [ bib | .pdf | Abstract ]

Micah Sherr and Matt Blaze. Application Containers without Virtual Machines. In 2nd ACM Workshop on Virtual Machine Security (VMSec), November 2009. [ bib | .pdf | Abstract ]

Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, and Matt Blaze. Can They Hear me Now? A Security Analysis of Law Enforcement Wiretaps. In ACM Conference on Computer and Communications Security (CCS), November 2009. [ bib | .pdf | Abstract ]

Micah Sherr, Matt Blaze, and Boon Thau Loo. Scalable Link-Based Relay Selection for Anonymous Routing. In Privacy Enhancing Technologies Symposium (PETS), August 2009. [ bib | .pdf | Abstract ]

Micah Sherr, Matt Blaze, and Boon Thau Loo. Veracity: Practical Secure Network Coordinates via Vote-based Agreements. In USENIX Annual Technical Conference (USENIX ATC), June 2009. [ bib | .pdf | Abstract ]

Adam Aviv, Pavol Cerný, Sandy Clark, Eric Cronin, Gaurav Shah, Micah Sherr, and Matt Blaze. Security Evaluation of the ES&S Voting Machines and Election Management System. In Third USENIX/ACCURATE Electronic Voting Technology Workshop (EVT), August 2008. [ bib | .pdf | Abstract ]

Eric Cronin, Micah Sherr, and Matt Blaze. On the (un)Reliability of Eavesdropping. International Journal of Security and Networks (IJSN), 3(2), February 2008. [ bib | .pdf | Abstract ]

Micah Sherr, Boon Thau Loo, and Matt Blaze. Veracity: A Fully Decentralized Service for Securing Network Coordinate Systems. In 7th International Workshop on Peer-to-Peer Systems (IPTPS), February 2008. [ bib | .pdf | Abstract ]

Micah Sherr, Boon Thau Loo, and Matt Blaze. Towards Application-Aware Anonymous Routing. In Second USENIX Workshop on Hot Topics in Security (HotSec), August 2007. [ bib | .pdf | Abstract ]

Micah Sherr, Eric Cronin, and Matt Blaze. Measurable Security Through Isotropic Channels. In Fifteenth International Workshop on Security Protocols, May 2007. [ bib | .pdf | Abstract ]

Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, Zachary Ives, and Insup Lee. Sensor Network Security: More Interesting Than You Think. In USENIX Workshop on Hot Topics in Security (HotSec), August 2006. [ bib | .pdf | Abstract ]

Eric Cronin, Micah Sherr, and Matt Blaze. On the Reliability of Current Generation Network Eavesdropping Tools. In Second Annual IFIP WG 11.9 International Conference on Digital Forensics, January 2006. [ bib | .pdf | Abstract ]

Micah Sherr, Michael Greenwald, Carl A. Gunter, Sanjeev Khanna, and Santosh S. Venkatesh. Mitigating DoS Attack Through Selective Bin Verification. In Workshop on Secure Network Protocols (NPSec), November 2005. [ bib | .pdf | Abstract ]

Micah Sherr, Eric Cronin, Sandy Clark, and Matt Blaze. Signaling Vulnerabilities in Wiretapping Systems. IEEE Security & Privacy Magazine, 3(6):13-25, November 2005. [ bib | .pdf | Abstract ]

Eric Cronin, Micah Sherr, and Matt Blaze. Listen Too Closely and You May Be Confused. In Security Protocols Workshop, April 2005. [ bib | .pdf | Abstract ]

Mark Weiner, Micah Sherr, and Abigail Cohen. Metadata Tables to Enable Dynamic Data Modeling and Web Interface Design. International Journal of Medical Informatics, 65(1):51-58, April 2002. [ bib | http | Abstract ]

Book contributions

Micah Sherr. Eavesdropping. Encyclopedia of Cryptography and Security (2nd ed.). Springer, November 2011. [ bib ]

Non-peer reviewed

Andreas Haeberlen, Mingchen Zhao, Wenchao Zhou, Alexander Gurney, Micah Sherr, and Boon Thau Loo. Privacy-Preserving Collaborative Verification Protocols (Invited paper). In Workshop on Large-Scale Distributed Systems and Middleware (LADIS), July 2012. [ bib | .pdf | Abstract ]

Boon Thau Loo, Harjot Gill, Changbin Liu, Yun Mao, William R. Marczak, Micah Sherr, Anduo Wang, and Wenchao Zhou. Recent Advances in Declarative Networking (Invited paper). In International Symposium on Practical Aspects of Declarative Languages (PADL), 2012. [ bib | .pdf | Abstract ]

Micah Sherr. Testimony to the West Virginia Joint Judiciary Subcommittee, August 2009. Charleston, WV. [ bib | .pdf ]

Micah Sherr. Coordinate-Based Routing for High Performance Anonymity. PhD thesis, University of Pennsylvania, 2009. [ bib | .pdf | Abstract ]

Patrick McDaniel et al. EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing, December 2007. [ bib | .pdf ]

Matt Blaze, Arel Cordero, Sophie Engle, Chris Karlof, Naveen Sastry, Micah Sherr, Till Stegers, and Ka-Ping Yee. Source Code Review of the Sequoia Voting System, July 2007. Part of the California Secretary of State Top-to-Bottom Review of electronic voting machines. [ bib | .pdf ]

Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, and Sampath Kannan. Security protocols with isotropic channels. Technical Report TR-CIS-06-18, Department of Computer and Information Science, University of Pennsylvania, November 2006. [ bib | .pdf ]