Micah Sherr, Ph.D. - Publications

Affiliations: 
2009 University of Pennsylvania, Philadelphia, PA, United States 
Area:
Information Systems: Databases and Data Management

23 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Zhang Y, O'Neill A, Sherr M, Zhou W. Privacy-preserving network provenance Proceedings of the Vldb Endowment. 10: 1550-1561. DOI: 10.14778/3137628.3137661  0.367
2016 Tan H, Sherr M, Zhou W. Data-plane Defenses against Routing Attacks on Tor Proceedings On Privacy Enhancing Technologies. 2016: 276-293. DOI: 10.1515/popets-2016-0040  0.403
2016 Zhao M, Zhou W, Gurney AJT, Haeberlen A, Sherr M, Loo BT. Private and verifiable interdomain routing decisions Ieee/Acm Transactions On Networking. 24: 1011-1024. DOI: 10.1109/Tnet.2015.2409233  0.671
2015 Bates A, Butler KRB, Sherr M, Shields C, Traynor P, Wallach D. Accountable wiretapping-or-I know they can hear you now Journal of Computer Security. 23: 167-195. DOI: 10.3233/Jcs-140515  0.447
2015 Brad Moore W, Tan H, Sherr M, Maloof MA. Multi-class traffic morphing for encrypted VoIP communication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8975: 65-85. DOI: 10.1007/978-3-662-47854-7_5  0.332
2014 Sherr M, Gill H, Saeed TA, Mao A, Marczak WR, Soundararajan S, Zhou W, Loo BT, Blaze M. The design and implementation of the A3 application-aware anonymity platform Computer Networks. 58: 206-227. DOI: 10.1016/J.Comnet.2013.09.021  0.625
2014 Aviv AJ, Blaze M, Sherr M, Smith JM. Privacy-aware message exchanges for HumaNets Computer Communications. 48: 30-43. DOI: 10.1016/J.Comcom.2014.03.013  0.519
2014 Tan H, Wacek C, Newport C, Sherr M. A disruption-resistant MAC layer for multichannel wireless networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8878: 202-216.  0.415
2013 Johnson A, Wacek C, Jansen R, Sherr M, Syverson P. Users get routed: Traffic correlation on Tor by realistic adversaries Proceedings of the Acm Conference On Computer and Communications Security. 337-348. DOI: 10.1145/2508859.2516651  0.408
2012 Aviv AJ, Sherr M, Blaze M, Smith JM. Privacy-aware message exchanges for geographically routed human movement networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 181-198. DOI: 10.1007/978-3-642-33167-1_11  0.443
2012 Loo BT, Gill H, Liu C, Mao Y, Marczak WR, Sherr M, Wang A, Zhou W. Recent advances in declarative networking Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7149: 1-16. DOI: 10.1007/978-3-642-27694-1_1  0.67
2012 Zhou W, Mapara S, Ren Y, Li Y, Haeberlen A, Ives Z, Loo BT, Sherr M. Distributed time-aware provenance Proceedings of the Vldb Endowment. 6: 49-60.  0.616
2011 Moore WB, Wacek C, Sherr M. Exploring the potential benefits of expanded rate limiting in Tor: Slow and steady wins the race with Tortoise Acm International Conference Proceeding Series. 207-216. DOI: 10.1145/2076732.2076762  0.317
2011 Gurney AJT, Haeberlen A, Zhou W, Sherr M, Loo BT. Having your cake and eating it too: Routing security with privacy protections Proceedings of the 10th Acm Workshop On Hot Topics in Networks, Hotnets-10. DOI: 10.1145/2070562.2070577  0.637
2011 Zhou W, Fei Q, Narayan A, Haeberlen A, Loo BT, Sherr M. Secure network provenance Sosp'11 - Proceedings of the 23rd Acm Symposium On Operating Systems Principles. 295-310. DOI: 10.1145/2043556.2043584  0.639
2011 Zhou W, Fei Q, Sun S, Tao T, Haeberlen A, Ives Z, Loo BT, Sherr M. NetTrails: A declarative platform for maintaining and querying provenance in distributed systems Proceedings of the Acm Sigmod International Conference On Management of Data. 1323-1325. DOI: 10.1145/1989323.1989488  0.671
2010 Zhou W, Sherr M, Marczak WR, Zhang Z, Tao T, Loo BT, Lee I. Towards a data-centric view of cloud security International Conference On Information and Knowledge Management, Proceedings. 25-32. DOI: 10.1145/1871929.1871934  0.612
2010 Marczak WR, Huang SS, Bravenboer M, Sherr M, Loo BT, Aref M. SecureBlox: Customizable secure distributed data processing Proceedings of the Acm Sigmod International Conference On Management of Data. 723-734. DOI: 10.1145/1807167.1807246  0.653
2010 Zhou W, Sherr M, Tao T, Li X, Loo BT, Mao Y. Efficient querying and maintenance of network provenance at internet-scale Proceedings of the Acm Sigmod International Conference On Management of Data. 615-626. DOI: 10.1145/1807167.1807234  0.599
2009 Sherr M, Shah G, Cronin E, Clark S, Blaze M. Can they hear me now? A security analysis of law enforcement wiretaps Proceedings of the Acm Conference On Computer and Communications Security. 512-523. DOI: 10.1145/1653662.1653724  0.383
2009 Sherr M, Blaze M, Loo BT. Scalable link-based relay selection for anonymous routing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5672: 73-93. DOI: 10.1007/978-3-642-03168-7_5  0.564
2008 Cronin E, Sherr M, Blaze M. On the (un)reliability of eavesdropping International Journal of Security and Networks. 3: 103. DOI: 10.1504/Ijsn.2008.017223  0.315
2006 Cronin E, Sherr M, Blaze M. On the reliability of network eavesdropping tools Ifip International Federation For Information Processing. 222: 199-213.  0.325
Show low-probability matches.