Trey Herr

Hoover Institution at Stanford University

Visiting Fellow

Stanford, CA 94305-6010

United States

http://https://www.hoover.org/profiles/trey-herr

SCHOLARLY PAPERS

14

DOWNLOADS
Rank 8,887

SSRN RANKINGS

Top 8,887

in Total Papers Downloads

5,135

CITATIONS
Rank 47,382

SSRN RANKINGS

Top 47,382

in Total Papers Citations

9

Scholarly Papers (14)

1.

Taking Stock: Estimating Vulnerability Rediscovery

Belfer Cyber Security Project White Paper Series
Number of pages: 52 Posted: 07 Mar 2017 Last Revised: 28 Oct 2017
Hoover Institution at Stanford University, Harvard University - Berkman Klein Center for Internet & Society and Harvard University - John A. Paulson School of Engineering and Applied Sciences
Downloads 1,684 (9,547)
Citation 3

Abstract:

Loading...

software vulnerability, vulnerability rediscovery, information security economics

2.

Making Democracy Harder to Hack: Should Elections Be Classified as ‘Critical Infrastructure?’

University of Michigan Journal of Law Reform, 2017, Kelley School of Business Research Paper No. 16-75
Number of pages: 40 Posted: 19 Oct 2016 Last Revised: 17 Nov 2016
Indiana University - Kelley School of Business - Department of Business Law, Harvard University - Berkman Klein Center for Internet & Society, Harvard University, Harvard Kennedy School (HKS), Belfer Center for Science and International Affairs (BCSIA), University of Arizona - School of Government and Public Policy, Harvard University, Harvard Kennedy School (HKS), Belfer Center for Science and International Affairs (BCSIA), Indiana University Maurer School of Law, Hoover Institution at Stanford University and Duke Law School
Downloads 971 (22,452)

Abstract:

Loading...

cybersecurity, cyber attack, election, voting, critical infrastructure

3.

PrEP: A Framework for Malware & Cyber Weapons

The Journal of Information Warfare, Vol.13, No.1, February 2014
Number of pages: 20 Posted: 26 Oct 2013 Last Revised: 05 Apr 2015
Trey Herr
Hoover Institution at Stanford University
Downloads 579 (45,721)
Citation 5

Abstract:

Loading...

Cyber weapon, intrusion, cyberdefense, exploit, payload, malware

4.

Redefining Cybersecurity

American Foreign Policy Council - Defense Technology Program Brief, No. 8, January 2015
Number of pages: 7 Posted: 01 Feb 2015 Last Revised: 07 Apr 2015
Trey Herr and Allan A. Friedman
Hoover Institution at Stanford University and Harvard University - Harvard Kennedy School (HKS)
Downloads 363 (81,270)

Abstract:

Loading...

cybersecurity, cyber security, cybersecurity legislation, cybersecurity policy, information assurance, cybercrime, malware

5.

Cyber Crime: Security Under Scarce Resources

American Foreign Policy Council Defense Technology Program Brief, No. 11, June 2015
Number of pages: 10 Posted: 27 Jun 2015
Trey Herr and Sasha Romanosky
Hoover Institution at Stanford University and RAND Corporation
Downloads 310 (96,760)

Abstract:

Loading...

cyber crime, crime, economics of information security, malware, cyber insurance

6.

Cyber Weapons & Export Control: Incorporating Dual Use with the PrEP Model

Journal of National Security Law and Policy, Vol. 8, No. 2, 2015
Number of pages: 19 Posted: 28 Sep 2014 Last Revised: 20 Jan 2016
Trey Herr and Paul Rosenzweig
Hoover Institution at Stanford University and George Washington University School of Law
Downloads 262 (115,793)
Citation 2

Abstract:

Loading...

export control, malware, cyber weapons, national security, law, national security law, cyber security

7.

Military Cyber Operations: A Primer

American Foreign Policy Council Defense Technology Program Brief, No. 14, January 2016
Number of pages: 11 Posted: 03 Feb 2016
Trey Herr and Drew Herrick
Hoover Institution at Stanford University and George Washington University - Department of Political Science
Downloads 233 (130,497)

Abstract:

Loading...

milware, cyber security, military operations, cyberwar, offensive cyber operations,

8.

Malware Counter-Proliferation and the Wassenaar Arrangement

Proceedings of the 8th International Conference on Cyber Conflict
Number of pages: 19 Posted: 06 Jan 2016 Last Revised: 10 Jun 2016
Trey Herr
Hoover Institution at Stanford University
Downloads 167 (178,500)
Citation 1

Abstract:

Loading...

malware, milware, malware market, cyber crime, export controls, foreign policy, Wassenaar Arrangement

9.

Milware: Identification and Implications of State Authored Malicious Software

New Security Paradigms Workshop 2015
Number of pages: 15 Posted: 27 Feb 2015 Last Revised: 11 Nov 2015
Trey Herr and Eric Armbrust
Hoover Institution at Stanford University and George Washington University
Downloads 136 (210,580)
Citation 1

Abstract:

Loading...

cybersecurity, malware, international security, reverse engineering

10.

Combating Complexity: Offensive Cyber Capabilities and Integrated Warfighting

Number of pages: 29 Posted: 30 Sep 2016
Drew Herrick and Trey Herr
George Washington University - Department of Political Science and Hoover Institution at Stanford University
Downloads 130 (218,238)
Citation 1

Abstract:

Loading...

Cybersecurity, Offensive Cyber Operations, Military Technology, Integrated Warfighting, Military Effectiveness

11.

Understanding Information Assurance

American Foreign Policy Council - Defense Technology Program Brief, No. 10, April 2015
Number of pages: 9 Posted: 06 Apr 2015
Trey Herr and Eric Ormes
Hoover Institution at Stanford University and Government of the United States of America
Downloads 105 (255,167)

Abstract:

Loading...

12.

Governing Proliferation in Cybersecurity

Global Summitry, Volume 3, Issue 1, 2017
Number of pages: 22 Posted: 27 Apr 2017 Last Revised: 04 Jul 2017
Trey Herr
Hoover Institution at Stanford University
Downloads 84 (294,803)

Abstract:

Loading...

cybersecurity, proliferation, malware, Proliferation Security Initiative, Wassenaar Arrangement, governance

13.

Internet Security Governance - Building Security Without Piling On

American Foreign Policy Council Defense Technology Program Brief, No. 13, October 2015
Number of pages: 11 Posted: 17 Nov 2015
Trey Herr and Heather West
Hoover Institution at Stanford University and Mozilla Corp.
Downloads 81 (301,366)

Abstract:

Loading...

cyber security, internet governance, encryption, export control

14.

Countering the Proliferation of Malware: Targeting the Vulnerability Lifecycle

Belfer Cyber Security Project White Paper Series
Number of pages: 34 Posted: 27 Oct 2017 Last Revised: 28 Oct 2017
Trey Herr
Hoover Institution at Stanford University
Downloads 30 (465,108)

Abstract:

Loading...