Journal Articles
-
Accountable Wiretapping
A. Bates, K. Butler, M. Sherr, C. Shields, P. Traynor, and D. Wallach. Journal of Computer Security, 23:167--195, 2015.
-
Efficient Tagging of Remote Peers During Child Pornography Investigations
M. Liberatore, B. N. Levine, C. Shields, and B. Lynn, IEEE Transactions on Dependable and Secure Computing, January, 2014.
-
IP Covert Channel Detection
S. Cabuk, C. Brodley, and C. Shields. ACM Transactions on Information and Systems
Security (TISSEC) Vol. 12, Num 22. April 2009.
-
Passive-Logging Attacks Against Anonymous Communications Systems
M. Wright, M. Adler, B.N. Levine, and C. Shields. ACM Transactions on
Information and System Security (TISSEC) Vol. 11, Num. 2. March 2008.
-
A Secure Routing Protocol for Ad Hoc Networks
K. Sanzgiri, B. Dahill, D. LaFlamme, B. N. Levine,
C. Shields, and E. Belding-Royer. IEEE Journals on
Selected Areas in Communications Special issue on Wireless Ad hoc
Networks, Vol. 23, Num. 3. March, 2005. Note: The copy of the paper linked above
includes a letter providing additional information that was
precluded from the paper by space limitations.
-
The Session Token Protocol for Forensics and Traceback
B. Carrier and C. Shields. ACM Transactions on Information and
System Security (TISSEC). Vol. 7, No. 3. August 2004.
-
Providing Process Origin Information to
Aid in Computer Forensic Investigations
F. Buchholz and C. Shields. Journal of Computer Security, Vol. 7, Num. 4. November, 2004.
-
The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems
M. Wright, M. Adler, B. N. Levine, and C. Shields. ACM
Transactions on Information and System Security (TISSC)
,Vol. 7, No. 4. November 2004, by invitation.
-
Hordes - A Multicast Based Protocol for Anonymity
B.N. Levine and C. Shields. Journal of Computer Security, Vol. 10, Num. 3, 2002, pp. 213-240, by
invitation.
-
A Protocol for Hierarchical Multicast Routing
C. Shields and J.J. Garcia-Luna-Aceves. Computer
Communications, Vol. 23. Issue. 7, March 13, 2000, pages
628-641.
Conference Papers
-
DeDoS: Defusing DoS with Dispersion Oriented
Software.
Henri Maxime Demoulin*, Tavish
Vaidya*, Isaac Pedisich, Bob DiMaiolo, Jingyu Qian,
Chirag Shah, Yuankai Zhang, Ang Chen, Andreas
Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah
Sherr, Clay Shields, and Wenchao Zhou. In Annual
Computer Security Applications Conference (ACSAC),
December 2018. (* co-first authors)
-
A
Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS
Attacks in Data Centers (Demo).
Henri Maxime Demoulin*, Tavish Vaidya*, Isaac
Pedisich, Nik Sultana, Yuankai Zhang, Ang Chen,
Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan
Phan, Micah Sherr, Clay Shields, and Wenchao Zhou.
In Conference on Applications, Technologies,
Architectures, and Protocols for Computer
Communications (SIGCOMM), August 2017. (*co-first
authors)
-
Hidden Voice Commands
Nicholas Carlini, Pratyush Mishra, Tavish Vaidya,
Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao
Zhou. In USENIX Security Symposium (Security), August 2016.
-
Text-based Document Similarity Matching Using sdtext
C. Shields. Proceedings of the Hawaii International Conference on System
Sciences (HICSS), January 2016.
-
Accountable Wiretapping -or- I Know
They Can Hear You Now.
A. Bates, K. Butler, M. Sherr, C. Shields,
P. Traynor, and D. Wallach. In Network and Distributed
System Security Symposium (NDSS), February 2012.
-
A System for the Proactive, Continuous, and Efficient Collection of Digital Forensic Evidence
C. Shields, O. Frieder, M. Maloof. DFRWS Annual Digital Forensics Research Conference, August 2011
-
Strengthening Forensic Investigations of Child Pornography on P2P Networks
M. Liberatore, B. N. Levine, and
C. Shields. In Proc. ACM Conference on Future Networking
Technologies (CoNEXT), November 2010.
-
Forensic Investigation of Peer-to-Peer File Sharing Networks.
M. Liberatore, R. Erdely, T. Kerle,
B. N. Levine, and C. Shields. DFRWS Annual Digital Forensics Research Conference, August 2010.
-
Towards Proactive Forensic Evidentiary Collection
C. Shields. Proceedings of the Hawaii International Conference on System
Sciences (HICSS), January 2010.
-
Detecting the Sybil Attack in Mobile Ad
Hoc Networks
C. Piro, C. Shields, and B. N. Levine. Proceedings of the Second International Conference on Security and Privacy in Communication Networks (Securecomm), August, 2006.
-
IP Covert Timing Channels: An Initial Exploration
S. Cabuk, C. Brodley, and C. Shields. Proceedings of the ACM
Computer and Communications Security Conference, October, 2004.
-
Defending Anonymous Communication Against Passive Logging
Attacks
M. Wright, M. Adler, B. N. Levine, and C. Shields.
IEEE Symposium on Security and Privacy, Oakland, CA. May 2003.
-
A Secure Routing Protocol for Ad Hoc Networks
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. Belding-Royer. In Proceedings of
2002 IEEE International Conference on Network Protocols (ICNP), November 2002.
-
A Recursive Session Token Protocol For Use in Computer Forensics and TCP Traceback
B. Carrier and C. Shields. Proceedings of the IEEE INFOCOM 2002, June, 2002.
-
Providing Process Origin Information to Aid in Network Traceback
F. Buchholz and C. Shields. Proceedings of the 2002 USENIX Annual Technical Conference, June,
2002.
-
An Analysis of the Degradation of Anonymous Protocols
M. Wright, M. Adler, B.N. Levine, and C. Shields. Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS 2002), February 2002. Received the
Outstanding Paper Award.
-
Responder Anonymity and Anonymous Peer-to-Peer File Sharing
V. Scarlata, B.N. Levine, and C. Shields. Proceedings of the IEEE Intl. Conference on Network Protocols
(ICNP) 2001. November 2001.
-
A Protocol for Anonymous Communication Over the Internet
C. Shields and B. N. Levine.Proceedings of the 7th ACM Conference on Computer and Communication
Security, November 1-4, 2000, Athens, Greece.
-
KHIP - A Scalable Protocol for Secure Multicast Routing
C. Shields and J.J. Garcia-Luna-Aceves. Proceedings of the ACM
SIGCOMM 99, Cambridge, Massachusetts, September 1-3, 1999.
-
The HIP Protocol for Hierarchical Multicast Routing
C. Shields and J.J. Garcia-Luna-Aceves. Proceedings of the Seventeenth Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 98), Puerto Vallarta, Mexico, June
28-July 2, 1998.
-
The Ordered Core Based Tree Protocol
C. Shields and J.J. Garcia-Luna-Aceves. Proceedings of theIEEE INFOCOM 97, Kobe,
Japan, April 7-11, 1997.
Workshop Papers
-
Where art
thou, Eve? Experiences Laying Traps for Internet Eavesdroppers.
Tavish Vaidya, Eric Burger, Micah Sherr, and Clay Shields. In
USENIX Workshop on Cyber Security Experimentation and Test (CSET),
August 2017.
-
Dispersing Asymmetric DDoS Attacks with
SplitStack.
Ang Chen, Akshay Sriraman, Tavish Vaidya, Yuankai Zhang, Andreas
Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay
Shields, and Wenchao Zhou. In ACM Workshop on Hot Topics in Networks (HotNets),
November 2016.
-
Cocaine Noodles: Exploiting the
Gap between Human and Machine Speech
Recognition.
Tavish Vaidya, Yuankai Zhang, Micah Sherr, and Clay
Shields. In USENIX Workshop on
Offensive Technologies (WOOT), August 2015.
-
Collaborative Red Teaming for Anonymity System
Evaluation.
S. Clark, C. Wacek, M. Blaze, B. Thau Loo, M.
Sherr, C. Shields, and J. Smith. In USENIX
Workshop on Cyber Security Experimentation and Test
(CSET), August 2012.
-
Effective Digital Forensics Research
is Investigator-Centric
R. J. Walls, B. N. Levine, M.
Liberatore, and C. Shields. In Proc. USENIX Workshop on
Hot Topics in Security (HotSec), August 2011.
-
What do we mean by Network Denial of Service?
C. Shields. Proceedings of the 2002 IEEE Workshop on Information Assurance and Security, June,
2002, West Point, N.Y.
-
Tracing the Source of Network Attacks: A Technical, Legal, and Social Problem.
S. Lee and C. Shields. Proceedings of the Second Annual IEEE
Systems, Man, and Cybernetics Information Assurance
Workshop, June, 2001, West Point, N.Y.
-
Confidentiality and Anonymity Analysis of On-Line Payment Protocols
S. Mandujano and C. Shields. Computer Security Congress, November 2000, Mexico City, Mexico.
Patents
-
System and method for deterring malicious network attacks
C. Shields. US Patent 9483640.
-
Automated Forensic Document Signatures
C. Shields, M. Maloof, and O. Frieder. US Patent 8438174.
-
Automated Forensic Document Signatures
C. Shields, M. Maloof, and O. Frieder. US Patent 8312023.
-
Automated Forensic Document Signatures
C. Shields, M. Maloof, and O. Frieder. US Patent 8280905.
Other Publications
-
A Survey of Solutions to the Sybil Attack
B. N. Levine, C. Shields, and N. B. Margolin. Tech report
2006-052, University of Massachusetts Amherst. October, 2006.
-
Ask the Experts - How can deleted
computer files be retrieved at a later date?
C. Shields. Scientific American, April, 2004.
-
Ask the Experts - Why do computers crash?
C. Shields, Scientific American, May, 2003.
Software
-
sdtext
sdtext is software for creating portable digests for document similarity based on text.
-
RoundUp
M. Libertore, B.N. Levine and C. Shields. RoundUp is a
modified Gnutella client in use by various police forces to
locate and create warrants for arrest for indviduals sharing child pronography online. As of April, 2010, RoundUp has resulted in over 250 arrests for distribution of child pornography.