What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Micah Sherr
Google Scholar
53
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
SCIF: Privacy-Preserving Statistics Collection with Input Validation and Full Security.
Jianan Su
Laasya Bangalore
Harel Berger
Jason Yi
Sophia Castor
Micah Sherr
Muthuramakrishnan Venkitasubramaniam
2025
conf/uss
Censorship Evasion with Unidentified Protocol Generation.
Ryan Wails
Rob Jansen
Aaron Johnson
Micah Sherr
2024
journals/popets
Editors' Introduction.
Micah Sherr
Zubair Shafiq
2024
journals/popets
Editors' Introduction.
Micah Sherr
Zubair Shafiq
2024
journals/popets
Editors' Introduction.
Micah Sherr
Zubair Shafiq
2024
journals/popets
Editors' Introduction.
Micah Sherr
Zubair Shafiq
2024
conf/ccs
"Modern problems require modern solutions": Community-Developed Techniques for Online Exam Proctoring Evasion.
Lucy Simko
Adryana Hutchinson
Alvin Isaac
Evan Fries
Micah Sherr
Adam J. Aviv
2024
conf/uss
SpotProxy: Rediscovering the Cloud for Censorship Circumvention.
Patrick Tser Jern Kon
Sina Kamali
Jinyu Pei
Diogo Barradas
Ang Chen
Micah Sherr
Moti Yung
2024
conf/sp
NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge.
Patrick Tser Jern Kon
Aniket Gattani
Dhiraj Saharia
Tianyu Cao
Diogo Barradas
Ang Chen
Micah Sherr
Benjamin E. Ujcich
2024
conf/soups
"I can say I'm John Travolta...but I'm not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified Accounts.
Carson Powers
Nickolas Gravel
Christopher Pellegrini
Micah Sherr
Michelle L. Mazurek
Daniel Votipka
2024
conf/ndss
On Precisely Detecting Censorship Circumvention in Real-World Networks.
Ryan Wails
George Arnold Sullivan
Micah Sherr
Rob Jansen
2023
journals/popets
Editors' Introduction.
Michelle L. Mazurek
Micah Sherr
2023
journals/popets
Editors' Introduction.
Michelle L. Mazurek
Micah Sherr
2023
journals/popets
Editors' Introduction.
Michelle L. Mazurek
Micah Sherr
2023
journals/popets
Editors' Introduction.
Michelle L. Mazurek
Micah Sherr
2023
conf/uss
Educators' Perspectives of Using (or Not Using) Online Exam Proctoring.
David G. Balash
Elena Korkes
Miles Grant
Adam J. Aviv
Rahel A. Fainchtein
Micah Sherr
2023
conf/uss
Cadence: A Simulator for Human Movement-based Communication Protocols.
Harel Berger
Micah Sherr
Adam J. Aviv
2022
journals/popets
Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs.
Ryan Wails
Andrew Stange
Eliana Troper
Aylin Caliskan
Roger Dingledine
Rob Jansen
Micah Sherr
2022
conf/acsac
User Perceptions of the Privacy and Usability of Smart DNS.
Rahel A. Fainchtein
Adam J. Aviv
Micah Sherr
2021
journals/popets
Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services.
Rahel A. Fainchtein
Adam J. Aviv
Micah Sherr
Stephen Ribaudo
Armaan Khullar
2021
journals/popets
Residue-Free Computing.
Logan Arkema
Micah Sherr
2021
conf/soups
Examining the Examiners: Students' Privacy and Security Perceptions of Online Proctoring Services.
David G. Balash
Dongkun Kim
Darikia Shaibekova
Rahel A. Fainchtein
Micah Sherr
Adam J. Aviv
2020
conf/ccs
Bypassing Tor Exit Blocking with Exit Bridge Onion Services.
Zhao Zhang
Wenchao Zhou
Micah Sherr
2020
conf/dsn
Ephemeral Exit Bridges for Tor.
Zhao Zhang
Tavish Vaidya
Kartik Subramanian
Wenchao Zhou
Micah Sherr
2019
conf/uss
Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor.
Rob Jansen
Tavish Vaidya
Micah Sherr
2019
conf/sp
You Talk Too Much: Limiting Privacy Exposure Via Voice Input.
Tavish Vaidya
Micah Sherr
2019
conf/acsac
Whisper: a unilateral defense against VoIP traffic re-identification attacks.
Tavish Vaidya
Timothy Walsh
Micah Sherr
2018
conf/acsac
An Extensive Evaluation of the Internet's Open Proxies.
Akshaya Mani
Tavish Vaidya
David Dworken
Micah Sherr
2018
conf/acsac
DeDoS: Defusing DoS with Dispersion Oriented Software.
Henri Maxime Demoulin
Tavish Vaidya
Isaac Pedisich
Bob DiMaiolo
Jingyu Qian
Chirag Shah
Yuankai Zhang
Ang Chen
Andreas Haeberlen
Boon Thau Loo
Linh Thi Xuan Phan
Micah Sherr
Clay Shields
Wenchao Zhou
2017
conf/ccs
Distributed Measurement with Private Set-Union Cardinality.
Ellis Fenske
Akshaya Mani
Aaron Johnson
Micah Sherr
2017
conf/uss
Where art thou, Eve? Experiences laying traps for Internet eavesdroppers.
Tavish Vaidya
Eric William Burger
Micah Sherr
Clay Shields
2017
conf/ndss
HisTorε: Differentially Private and Robust Statistics Collection for Tor.
Akshaya Mani
Micah Sherr
2016
journals/popets
Data-plane Defenses against Routing Attacks on Tor.
Henry Tan
Micah Sherr
Wenchao Zhou
2016
journals/popets
Scalable and Anonymous Group Communication with MTor.
Dong Lin
Micah Sherr
Boon Thau Loo
2016
conf/uss
Hidden Voice Commands.
Nicholas Carlini
Pratyush Mishra
Tavish Vaidya
Yuankai Zhang
Micah Sherr
Clay Shields
David A. Wagner
Wenchao Zhou
2016
conf/esorics
On Manufacturing Resilient Opaque Constructs Against Static Analysis.
Brendan Sheridan
Micah Sherr
2015
conf/fc
Multi-class Traffic Morphing for Encrypted VoIP Communication.
W. Brad Moore
Henry Tan
Micah Sherr
Marcus A. Maloof
2014
conf/uss
Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport.
Rob Jansen
John Geddes
Chris Wacek
Micah Sherr
Paul F. Syverson
2013
conf/ccs
Users get routed: traffic correlation on tor by realistic adversaries.
Aaron Johnson
Chris Wacek
Rob Jansen
Micah Sherr
Paul F. Syverson
2013
conf/ndss
An Empirical Evaluation of Relay Selection in Tor.
Chris Wacek
Henry Tan
Kevin S. Bauer
Micah Sherr
2013
conf/acsac
Validating web content with senser.
Jordan Wilberding
Andrew Yates
Micah Sherr
Wenchao Zhou
2012
conf/uss
Collaborative Red Teaming for Anonymity System Evaluation.
Sandy Clark
Chris Wacek
Matt Blaze
Boon Thau Loo
Micah Sherr
Clay Shields
Jonathan M. Smith
2012
conf/esorics
Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks.
Adam J. Aviv
Micah Sherr
Matt Blaze
Jonathan M. Smith
2012
conf/ndss
Accountable Wiretapping -or- I know they can hear you now.
Adam Bates
Kevin R. B. Butler
Micah Sherr
Clay Shields
Patrick Traynor
Dan S. Wallach
2011
conf/uss
ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation.
Kevin S. Bauer
Micah Sherr
Dirk Grunwald
2011
conf/acsac
Exploring the potential benefits of expanded rate limiting in Tor: slow and steady wins the race with Tortoise.
W. Brad Moore
Chris Wacek
Micah Sherr
2010
conf/uss
Evading Cellular Data Monitoring with Human Movement Networks.
Adam J. Aviv
Micah Sherr
Matt Blaze
Jonathan M. Smith
2010
conf/ndss
A3: An Extensible Platform for Application-Aware Anonymity.
Micah Sherr
Andrew Mao
William R. Marczak
Wenchao Zhou
Boon Thau Loo
Matt Blaze
2009
conf/ccs
Can they hear me now?: a security analysis of law enforcement wiretaps.
Micah Sherr
Gaurav Shah
Eric Cronin
Sandy Clark
Matt Blaze
2009
conf/ccs
Application containers without virtual machines.
Micah Sherr
Matt Blaze
2008
conf/uss
Security Evaluation of ES&S Voting Machines and Election Management System.
Adam J. Aviv
Pavol Cerný
Sandy Clark
Eric Cronin
Gaurav Shah
Micah Sherr
Matt Blaze
2007
conf/uss
Towards Application-Aware Anonymous Routing.
Micah Sherr
Boon Thau Loo
Matt Blaze
2006
conf/uss
Sensor Network Security: More Interesting Than You Think.
Madhukar Anand
Eric Cronin
Micah Sherr
Zachary G. Ives
Insup Lee
Coauthors
Aaron Johnson
(3)
Adam Bates
(1)
Adam J. Aviv
(9)
Adryana Hutchinson
(1)
Akshaya Mani
(3)
Alvin Isaac
(1)
Andreas Haeberlen
(1)
Andrew Mao
(1)
Andrew Stange
(1)
Andrew Yates
(1)
Ang Chen
(3)
Aniket Gattani
(1)
Armaan Khullar
(1)
Aylin Caliskan
(1)
Benjamin E. Ujcich
(1)
Bob DiMaiolo
(1)
Boon Thau Loo
(5)
Brendan Sheridan
(1)
Carson Powers
(1)
Chirag Shah
(1)
Chris Wacek
(5)
Christopher Pellegrini
(1)
Clay Shields
(5)
Dan S. Wallach
(1)
Daniel Votipka
(1)
Darikia Shaibekova
(1)
David A. Wagner
(1)
David Dworken
(1)
David G. Balash
(2)
Dhiraj Saharia
(1)
Diogo Barradas
(2)
Dirk Grunwald
(1)
Dong Lin
(1)
Dongkun Kim
(1)
Elena Korkes
(1)
Eliana Troper
(1)
Ellis Fenske
(1)
Eric Cronin
(3)
Eric William Burger
(1)
Evan Fries
(1)
Gaurav Shah
(2)
George Arnold Sullivan
(1)
Harel Berger
(2)
Henri Maxime Demoulin
(1)
Henry Tan
(3)
Insup Lee
(1)
Isaac Pedisich
(1)
Jason Yi
(1)
Jianan Su
(1)
Jingyu Qian
(1)
Jinyu Pei
(1)
John Geddes
(1)
Jonathan M. Smith
(3)
Jordan Wilberding
(1)
Kartik Subramanian
(1)
Kevin R. B. Butler
(1)
Kevin S. Bauer
(2)
Laasya Bangalore
(1)
Linh Thi Xuan Phan
(1)
Logan Arkema
(1)
Lucy Simko
(1)
Madhukar Anand
(1)
Marcus A. Maloof
(1)
Matt Blaze
(8)
Micah Sherr
(53)
Michelle L. Mazurek
(5)
Miles Grant
(1)
Moti Yung
(1)
Muthuramakrishnan Venkitasubramaniam
(1)
Nicholas Carlini
(1)
Nickolas Gravel
(1)
Patrick Traynor
(1)
Patrick Tser Jern Kon
(2)
Paul F. Syverson
(2)
Pavol Cerný
(1)
Pratyush Mishra
(1)
Rahel A. Fainchtein
(4)
Rob Jansen
(6)
Roger Dingledine
(1)
Ryan Wails
(3)
Sandy Clark
(3)
Sina Kamali
(1)
Sophia Castor
(1)
Stephen Ribaudo
(1)
Tavish Vaidya
(8)
Tianyu Cao
(1)
Timothy Walsh
(1)
W. Brad Moore
(2)
Wenchao Zhou
(7)
William R. Marczak
(1)
Yuankai Zhang
(2)
Zachary G. Ives
(1)
Zhao Zhang
(2)
Zubair Shafiq
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to