Micah Sherr [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Whisper: A Unilateral Defense Against VoIP Traffic Re-Identification Attacks ACSAC2019-2019 - San Juan, Puerto Rico
Where art thou, Eve? Experiences laying traps for Internet eavesdroppers CSET-2017 - vancouver,canada
Hidden Voice Commands USENIX-2016 - austin,usa
Data-plane Defenses against Routing Attacks on Tor PETS-2016 - darmstadt,germany
Scalable and Anonymous Group Communication with MTor PETS-2016 - darmstadt,germany
Welcome (Sierra CD) ACSAC-2015 - los angeles,usa
Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition WOOT-2015 - washington,USA
Detecting Covert Timing Channels with Time-Deterministic Replay OSDI-2014 - broomfield,usa
Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport usenix-2014 - san diego,usa
Validating Web Content with Senser ACSAC-2013 - New Orleans, USA
Understanding Site-Based Inference Potential forIdentifying Hidden Attributes BigDATA-2013 - Washington, D.C.
AttackingUnderstanding Site-Based Inference Potential forIdentifying Hidden Attributes EconCom-2013 - Washington, D.C.
Protection Mechanisms 19th USENIX Security Symposium-2010 - Washington DC, USA Security
Evading Cellular Data Monitoring With Human Movement Networks 5th USENIX Workshop on Hot Topics in Security-2010 - Washington DC, USA Security
Hacking Democracy: An In Depth Analysis Of The Es&S Voting Systems The Last HOPE-2008 - USA Security Analysis
Climbing Everest: An Inside Look At Voting Systems Used By The State Of Ohio ShmooCon-2008 - Washington DC, USA Security Infrastructure Analysis
Towards Application-Aware Anonymous Routing 2nd USENIX Workshop on Hot Topics in Security-2007 - Boston, USA Security
Sensor Network Security: More Interesting Than You Think 1st USENIX Workshop on Hot Topics in Security-2006 - Vancouver, Canada Security
Law Enforcement Wiretaps: Background And Vulnerabilities HOPE Number 6-2006 - USA Security Legal