Follow
Sharon Goldberg
Sharon Goldberg
Computer Science, Boston University
Verified email at cs.bu.edu - Homepage
Title
Cited by
Cited by
Year
Eclipse attacks on Bitcoin’s peer-to-peer network
E Heilman, A Kendler, A Zohar, S Goldberg
24th USENIX security symposium (USENIX security 15), 129-144, 2015
10922015
Tumblebit: An untrusted bitcoin-compatible anonymous payment hub
E Heilman, L Alshenibr, F Baldimtsi, A Scafuro, S Goldberg
Network and distributed system security symposium, 2017
3432017
Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions
E Heilman, F Baldimtsi, S Goldberg
International conference on financial cryptography and data security, 43-60, 2016
2492016
Calibrating data to sensitivity in private data analysis
D Proserpio, S Goldberg, F McSherry
arXiv preprint arXiv:1203.3453, 2012
218*2012
Low-resource eclipse attacks on ethereum's peer-to-peer network
Y Marcus, E Heilman, S Goldberg
Cryptology ePrint Archive, 2018
2162018
How secure are secure interdomain routing protocols
S Goldberg, M Schapira, P Hummon, J Rexford
ACM SIGCOMM Computer Communication Review 40 (4), 87-98, 2010
2012010
Let the market drive deployment: A strategy for transitioning to BGP security
P Gill, M Schapira, S Goldberg
ACM SIGCOMM computer communication review 41 (4), 14-25, 2011
1672011
Why is it taking so long to secure internet routing?
S Goldberg
Communications of the ACM 57 (10), 56-63, 2014
1592014
BGP security in partial deployment: Is the juice worth the squeeze?
R Lychev, S Goldberg, M Schapira
Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, 171-182, 2013
138*2013
Path-quality monitoring in the presence of adversaries
S Goldberg, D Xiao, E Tromer, B Barak, J Rexford
ACM SIGMETRICS Performance Evaluation Review 36 (1), 193-204, 2008
1282008
A survey of interdomain routing policies
P Gill, M Schapira, S Goldberg
ACM SIGCOMM Computer Communication Review 44 (1), 28-34, 2013
1252013
Attacking the network time protocol
A Malhotra, IE Cohen, E Brakke, S Goldberg
Cryptology ePrint Archive, 2015
1172015
On the risk of misbehaving RPKI authorities
D Cooper, E Heilman, K Brogle, L Reyzin, S Goldberg
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 1-7, 2013
1132013
NSEC5: provably preventing DNSSEC zone enumeration
S Goldberg, M Naor, D Papadopoulos, L Reyzin, S Vasant, A Ziv
Cryptology ePrint Archive, 2014
772014
Rationality and traffic attraction: Incentives for honest path announcements in BGP
S Goldberg, S Halevi, AD Jaggard, V Ramachandran, RN Wright
ACM SIGCOMM Computer Communication Review 38 (4), 267-278, 2008
77*2008
From the Consent of the Routed: Improving the Transparency of the RPKI
E Heilman, D Cooper, L Reyzin, S Goldberg
Proceedings of the 2014 ACM conference on SIGCOMM, 51-62, 2014
692014
Protocols and lower bounds for failure localization in the Internet
B Barak, S Goldberg, D Xiao
Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008
682008
Modeling on quicksand: Dealing with the scarcity of ground truth in interdomain routing data
P Gill, M Schapira, S Goldberg
ACM SIGCOMM Computer Communication Review 42 (1), 40-46, 2012
672012
Characterizing web censorship worldwide: Another look at the opennet initiative data
P Gill, M Crete-Nishihata, J Dalek, S Goldberg, A Senft, G Wiseman
ACM Transactions on the Web (TWEB) 9 (1), 1-29, 2015
652015
Loopholes for Circumventing the Constitution: Warrantless Bulk Surveillance on Americans by Collecting Network Traffic Abroad
A Arnbak, S Goldberg
HOTPETS, 2014
65*2014
The system can't perform the operation now. Try again later.
Articles 1–20