Micah Sherr, Ph.D. - Publications

Affiliations: 
2009 University of Pennsylvania, Philadelphia, PA, United States 
Area:
Information Systems: Databases and Data Management

37 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 Zhao M, Zhou W, Gurney AJT, Haeberlen A, Sherr M, Loo BT. Private and verifiable interdomain routing decisions Ieee/Acm Transactions On Networking. 24: 1011-1024. DOI: 10.1109/Tnet.2015.2409233  0.6
2015 Bates A, Butler KRB, Sherr M, Shields C, Traynor P, Wallach D. Accountable wiretapping-or-I know they can hear you now Journal of Computer Security. 23: 167-195. DOI: 10.3233/Jcs-140515  0.6
2015 Singh L, Yang GH, Sherr M, Hian-Cheong A, Tian K, Zhu J, Zhang S. Public information exposure detection: Helping users understand their web footprints Proceedings of the 2015 Ieee/Acm International Conference On Advances in Social Networks Analysis and Mining, Asonam 2015. 153-161. DOI: 10.1145/2808797.2809280  0.6
2015 Singh L, Yang H, Sherr M, Wei Y, Hian-Cheong A, Tian K, Zhu J, Zhang S, Vaidya T, Asgarli E. Helping users understand their web footprints Www 2015 Companion - Proceedings of the 24th International Conference On World Wide Web. 117-118. DOI: 10.1145/2740908.2742763  0.6
2015 Brad Moore W, Tan H, Sherr M, Maloof MA. Multi-class traffic morphing for encrypted VoIP communication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8975: 65-85. DOI: 10.1007/978-3-662-47854-7_5  0.6
2015 Vaidya T, Sherr M. Mind your (R,Φ)s: Location-based privacy controls for consumer drones (transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9379: 91-104. DOI: 10.1007/978-3-319-26096-9_10  0.6
2015 Sherr M, Robertson W. Message from the program chairs Acm International Conference Proceeding Series. 7: xi.  0.6
2014 Fineman JT, Newport C, Sherr M, Wang T. Fair maximal independent sets Proceedings of the International Parallel and Distributed Processing Symposium, Ipdps. 712-721. DOI: 10.1109/IPDPS.2014.79  0.6
2014 Sherr M, Gill H, Saeed TA, Mao A, Marczak WR, Soundararajan S, Zhou W, Loo BT, Blaze M. The design and implementation of the A3 application-aware anonymity platform Computer Networks. 58: 206-227. DOI: 10.1016/J.Comnet.2013.09.021  0.6
2014 Aviv AJ, Blaze M, Sherr M, Smith JM. Privacy-aware message exchanges for HumaNets Computer Communications. 48: 30-43. DOI: 10.1016/J.Comcom.2014.03.013  0.6
2014 Tan H, Sherr M. Censorship resistance as a side-effect: (Transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8809: 227-238. DOI: 10.1007/978-3-319-12400-1_22  0.6
2014 Tan H, Wacek C, Newport C, Sherr M. A disruption-resistant MAC layer for multichannel wireless networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8878: 202-216.  0.6
2013 Wilberding J, Yates A, Sherr M, Zhou W. Validating web content with senser Acm International Conference Proceeding Series. 339-348. DOI: 10.1145/2523649.2523669  0.6
2013 Johnson A, Wacek C, Jansen R, Sherr M, Syverson P. Users get routed: Traffic correlation on Tor by realistic adversaries Proceedings of the Acm Conference On Computer and Communications Security. 337-348. DOI: 10.1145/2508859.2516651  0.6
2013 Moore WB, Wei Y, Orshefsky A, Sherr M, Singh L, Yang H. Understanding site-based inference potential for identifying hidden attributes Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 570-577. DOI: 10.1109/SocialCom.2013.86  0.6
2013 Ferro J, Singh L, Sherr M. Identifying individual vulnerability based on public data 2013 11th Annual Conference On Privacy, Security and Trust, Pst 2013. 119-126. DOI: 10.1109/PST.2013.6596045  0.6
2012 Tan H, Goharian N, Sherr M. $100,000 prize jackpot. Call now!: Identifying the pertinent features of SMS spam Sigir'12 - Proceedings of the International Acm Sigir Conference On Research and Development in Information Retrieval. 1175-1176. DOI: 10.1145/2348283.2348526  0.6
2012 Aviv AJ, Sherr M, Blaze M, Smith JM. Privacy-aware message exchanges for geographically routed human movement networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 181-198. DOI: 10.1007/978-3-642-33167-1_11  0.6
2012 Loo BT, Gill H, Liu C, Mao Y, Marczak WR, Sherr M, Wang A, Zhou W. Recent advances in declarative networking Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7149: 1-16. DOI: 10.1007/978-3-642-27694-1_1  0.6
2012 Zhou W, Mapara S, Ren Y, Li Y, Haeberlen A, Ives Z, Loo BT, Sherr M. Distributed time-aware provenance Proceedings of the Vldb Endowment. 6: 49-60.  0.6
2011 Moore WB, Wacek C, Sherr M. Exploring the potential benefits of expanded rate limiting in Tor: Slow and steady wins the race with Tortoise Acm International Conference Proceeding Series. 207-216. DOI: 10.1145/2076732.2076762  0.6
2011 Gurney AJT, Haeberlen A, Zhou W, Sherr M, Loo BT. Having your cake and eating it too: Routing security with privacy protections Proceedings of the 10th Acm Workshop On Hot Topics in Networks, Hotnets-10. DOI: 10.1145/2070562.2070577  0.6
2011 Zhou W, Fei Q, Narayan A, Haeberlen A, Loo BT, Sherr M. Secure network provenance Sosp'11 - Proceedings of the 23rd Acm Symposium On Operating Systems Principles. 295-310. DOI: 10.1145/2043556.2043584  0.6
2011 Zhou W, Fei Q, Sun S, Tao T, Haeberlen A, Ives Z, Loo BT, Sherr M. NetTrails: A declarative platform for maintaining and querying provenance in distributed systems Proceedings of the Acm Sigmod International Conference On Management of Data. 1323-1325. DOI: 10.1145/1989323.1989488  0.6
2010 Zhou W, Sherr M, Marczak WR, Zhang Z, Tao T, Loo BT, Lee I. Towards a data-centric view of cloud security International Conference On Information and Knowledge Management, Proceedings. 25-32. DOI: 10.1145/1871929.1871934  0.6
2010 Marczak WR, Huang SS, Bravenboer M, Sherr M, Loo BT, Aref M. SecureBlox: Customizable secure distributed data processing Proceedings of the Acm Sigmod International Conference On Management of Data. 723-734. DOI: 10.1145/1807167.1807246  0.6
2010 Zhou W, Sherr M, Tao T, Li X, Loo BT, Mao Y. Efficient querying and maintenance of network provenance at internet-scale Proceedings of the Acm Sigmod International Conference On Management of Data. 615-626. DOI: 10.1145/1807167.1807234  0.6
2010 Sherr M. Measurable security through isotropic channels (transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5964: 13-19. DOI: 10.1007/978-3-642-17773-6_3  0.6
2010 Sherr M, Cronin E, Blaze M. Measurable security through isotropic channels Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5964: 3-12. DOI: 10.1007/978-3-642-17773-6_2  0.6
2009 Sherr M, Blaze M. Application containers without virtual machines Proceedings of the Acm Conference On Computer and Communications Security. 39-41. DOI: 10.1145/1655148.1655155  0.6
2009 Sherr M, Shah G, Cronin E, Clark S, Blaze M. Can they hear me now? A security analysis of law enforcement wiretaps Proceedings of the Acm Conference On Computer and Communications Security. 512-523. DOI: 10.1145/1653662.1653724  0.6
2009 Sherr M, Blaze M, Loo BT. Scalable link-based relay selection for anonymous routing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5672: 73-93. DOI: 10.1007/978-3-642-03168-7_5  0.6
2007 Cronin E, Sherr M, Blaze M. Listen too closely and you may be confused Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4631: 245-249.  0.6
2006 Cronin E, Sherr M, Blaze M. On the reliability of network eavesdropping tools Ifip International Federation For Information Processing. 222: 199-213.  0.6
2005 Sherr M, Greenwald M, Gunter CA, Khanna S, Venkatesh SS. Mitigating DoS attack through selective bin verification 2005 First Workshop On Secure Network Protocols, Npsec, Held in Conjunction With Icnp 2005: 13th Ieee International Conference On Network Protocols. 2005: 7-12. DOI: 10.1109/NPSEC.2005.1532046  0.6
2005 Sherr M, Cronin E, Clark S, Blaze M. Signaling vulnerabilities in wiretapping systems Ieee Security and Privacy. 3: 13-25. DOI: 10.1109/MSP.2005.160  0.6
2002 Weiner M, Sherr M, Cohen A. Metadata tables to enable dynamic data modeling and web interface design: the SEER example. International Journal of Medical Informatics. 65: 51-8. PMID 11904248 DOI: 10.1016/S1386-5056(02)00002-3  0.6
Show low-probability matches.