[go: up one dir, main page]

Follow
Eric Wustrow
Title
Cited by
Cited by
Year
{ZMap}: Fast internet-wide scanning and its security applications
Z Durumeric, E Wustrow, JA Halderman
22nd USENIX Security Symposium (USENIX Security 13), 605-620, 2013
13002013
Imperfect forward secrecy: How Diffie-Hellman fails in practice
D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
8052015
Mining your Ps and Qs: Detection of widespread weak keys in network devices
N Heninger, Z Durumeric, E Wustrow, JA Halderman
21st USENIX Security Symposium (USENIX Security 12), 205-220, 2012
6522012
Elliptic curve cryptography in practice
JW Bos, JA Halderman, N Heninger, J Moore, M Naehrig, E Wustrow
International conference on financial cryptography and data security, 157-175, 2014
4702014
Security analysis of India's electronic voting machines
S Wolchok, E Wustrow, JA Halderman, HK Prasad, A Kankipati, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
2902010
Telex: Anticensorship in the network infrastructure
E Wustrow, S Wolchok, I Goldberg, JA Halderman
20th USENIX Security Symposium (USENIX Security 11), 2011
2522011
Internet background radiation revisited
E Wustrow, M Karir, M Bailey, F Jahanian, G Huston
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 62-74, 2010
2292010
Attacking the Washington, DC Internet voting system
S Wolchok, E Wustrow, D Isabel, JA Halderman
International Conference on Financial Cryptography and Data Security, 114-128, 2012
1882012
The use of TLS in Censorship Circumvention.
S Frolov, E Wustrow
NDSS, 2019
1232019
{TapDance}:{End-to-Middle} Anticensorship without Flow Blocking
E Wustrow, CM Swanson, JA Halderman
23rd USENIX Security Symposium (USENIX Security 14), 159-174, 2014
1082014
How the Great Firewall of China detects and blocks fully encrypted traffic
M Wu, J Sippe, D Sivakumar, J Burg, P Anderson, X Wang, K Bock, ...
32nd USENIX Security Symposium (USENIX Security 23), 2653-2670, 2023
852023
Weaponizing middleboxes for {TCP} reflected amplification
K Bock, A Alaraj, Y Fax, K Hurley, E Wustrow, D Levin
30th USENIX Security Symposium (USENIX Security 21), 3345-3361, 2021
742021
Trusted click: Overcoming security issues of NFV in the cloud
M Coughlin, E Keller, E Wustrow
Proceedings of the ACM International Workshop on Security in Software …, 2017
642017
Cage: Taming certificate authorities by inferring restricted scopes
J Kasten, E Wustrow, JA Halderman
International Conference on Financial Cryptography and Data Security, 329-337, 2013
632013
This is your president speaking: Spoofing alerts in 4G LTE networks
G Lee, J Lee, J Lee, Y Im, M Hollingsworth, E Wustrow, D Grunwald, S Ha
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
622019
Detecting Probe-resistant Proxies.
S Frolov, J Wampler, E Wustrow
NDSS, 2020
492020
ExSpectre: Hiding Malware in Speculative Execution.
J Wampler, I Martiny, E Wustrow
NDSS, 2019
482019
Throttling Twitter: an emerging censorship technique in Russia
D Xue, R Ramesh, VS S, L Evdokimov, A Viktorov, A Jain, E Wustrow, ...
Proceedings of the 21st ACM internet measurement conference, 435-443, 2021
472021
Security analysis of a {Full-Body} scanner
K Mowery, E Wustrow, T Wypych, C Singleton, C Comfort, E Rescorla, ...
23rd USENIX Security Symposium (USENIX Security 14), 369-384, 2014
432014
Conjure: Summoning proxies from unused address space
S Frolov, J Wampler, SC Tan, JA Halderman, N Borisov, E Wustrow
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
382019
The system can't perform the operation now. Try again later.
Articles 1–20