Hidden voice commands N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ... 25th USENIX security symposium (USENIX security 16), 513-530, 2016 | 762 | 2016 |
Users get routed: Traffic correlation on Tor by realistic adversaries A Johnson, C Wacek, R Jansen, M Sherr, P Syverson Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 372 | 2013 |
Cocaine noodles: exploiting the gap between human and machine speech recognition T Vaidya, Y Zhang, M Sherr, C Shields 9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015 | 248 | 2015 |
Efficient querying and maintenance of network provenance at internet-scale W Zhou, M Sherr, T Tao, X Li, BT Loo, Y Mao Proceedings of the 2010 ACM SIGMOD International Conference on Management of …, 2010 | 209 | 2010 |
Secure network provenance W Zhou, Q Fei, A Narayan, A Haeberlen, BT Loo, M Sherr Proceedings of the twenty-third ACM symposium on operating systems …, 2011 | 177 | 2011 |
{ExperimenTor}: A testbed for safe and realistic tor experimentation K Bauer, M Sherr, D Grunwald 4th Workshop on Cyber Security Experimentation and Test (CSET 11), 2011 | 106 | 2011 |
An Empirical Evaluation of Relay Selection in Tor. C Wacek, H Tan, KS Bauer, M Sherr NDss, 2013 | 104 | 2013 |
Let SDN be your eyes: Secure forensics in data center networks A Bates, K Butler, A Haeberlen, M Sherr, W Zhou Proceedings of the NDSS workshop on security of emerging network …, 2014 | 102 | 2014 |
Understanding tor usage with privacy-preserving measurement A Mani, T Wilson-Brown, R Jansen, A Johnson, M Sherr Proceedings of the Internet Measurement Conference 2018, 175-187, 2018 | 88 | 2018 |
Scalable link-based relay selection for anonymous routing M Sherr, M Blaze, BT Loo Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009 | 80 | 2009 |
Security challenges in next generation cyber physical systems M Anand, E Cronin, M Sherr, M Blaze, Z Ives, I Lee Beyond SCADA: Networked Embedded Control for Cyber Physical Systems 41, 2006 | 68 | 2006 |
Distributed time-aware provenance W Zhou, S Mapara, Y Ren, Y Li, A Haeberlen, Z Ives, BT Loo, M Sherr Proceedings of the VLDB Endowment 6 (2), 49-60, 2012 | 65 | 2012 |
Examining the examiners: Students' privacy and security perceptions of online proctoring services DG Balash, D Kim, D Shaibekova, RA Fainchtein, M Sherr, AJ Aviv Seventeenth symposium on usable privacy and security (SOUPS 2021), 633-652, 2021 | 61 | 2021 |
Detecting Covert Timing Channels with {Time-Deterministic} Replay A Chen, WB Moore, H Xiao, A Haeberlen, LTX Phan, M Sherr, W Zhou 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014 | 61 | 2014 |
Never Been {KIST}:{Tor’s} Congestion Management Blossoms with {Kernel-Informed} Socket Transport R Jansen, J Geddes, C Wacek, M Sherr, P Syverson 23rd USENIX Security Symposium (USENIX Security 14), 127-142, 2014 | 60 | 2014 |
Exploring the potential benefits of expanded rate limiting in tor: Slow and steady wins the race with tortoise WB Moore, C Wacek, M Sherr Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 56 | 2011 |
Security evaluation of ES&S voting machines and election management system A Aviv, P Černy, S Clark, E Cronin, G Shah, M Sherr, M Blaze Proceedings of the conference on Electronic voting technology, 1-13, 2008 | 55 | 2008 |
Private and verifiable interdomain routing decisions M Zhao, W Zhou, AJT Gurney, A Haeberlen, M Sherr, BT Loo Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies …, 2012 | 54 | 2012 |
Point break: A study of bandwidth {Denial-of-Service} attacks against tor R Jansen, T Vaidya, M Sherr 28th USENIX security symposium (USENIX Security 19), 1823-1840, 2019 | 52 | 2019 |
Veracity: Practical Secure Network Coordinates via Vote-based Agreements. M Sherr, M Blaze, BT Loo USENIX Annual Technical Conference, 2009 | 47 | 2009 |