Eric Wustrow
Title
Cited by
Cited by
Year
ZMap: Fast Internet-wide scanning and its security applications
Z Durumeric, E Wustrow, JA Halderman
22nd {USENIX} Security Symposium ({USENIX} Security 13), 605-620, 2013
6832013
Imperfect forward secrecy: How Diffie-Hellman fails in practice
D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
5072015
Mining your Ps and Qs: Detection of widespread weak keys in network devices
N Heninger, Z Durumeric, E Wustrow, JA Halderman
21st {USENIX} Security Symposium ({USENIX} Security 12), 205-220, 2012
4682012
Elliptic curve cryptography in practice
JW Bos, JA Halderman, N Heninger, J Moore, M Naehrig, E Wustrow
International Conference on Financial Cryptography and Data Security, 157-175, 2014
2642014
Telex: Anticensorship in the Network Infrastructure.
E Wustrow, S Wolchok, I Goldberg, JA Halderman
USENIX Security Symposium, 45, 2011
2042011
Security analysis of India's electronic voting machines
S Wolchok, E Wustrow, JA Halderman, HK Prasad, A Kankipati, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1982010
Internet background radiation revisited
E Wustrow, M Karir, M Bailey, F Jahanian, G Huston
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 62-74, 2010
1622010
Attacking the Washington, DC Internet voting system
S Wolchok, E Wustrow, D Isabel, JA Halderman
International Conference on Financial Cryptography and Data Security, 114-128, 2012
1472012
Tapdance: End-to-middle anticensorship without flow blocking
E Wustrow, CM Swanson, JA Halderman
23rd {USENIX} Security Symposium ({USENIX} Security 14), 159-174, 2014
722014
Trusted click: overcoming security issues of NFV in the cloud
M Coughlin, E Keller, E Wustrow
Proceedings of the ACM International Workshop on Security in Software …, 2017
392017
Cage: Taming certificate authorities by inferring restricted scopes
J Kasten, E Wustrow, JA Halderman
International Conference on Financial Cryptography and Data Security, 329-337, 2013
382013
Security analysis of a full-body scanner
K Mowery, E Wustrow, T Wypych, C Singleton, C Comfort, E Rescorla, ...
23rd {USENIX} Security Symposium ({USENIX} Security 14), 369-384, 2014
252014
The use of TLS in Censorship Circumvention.
S Frolov, E Wustrow
NDSS, 2019
242019
An ISP-scale deployment of TapDance
S Frolov, F Douglas, W Scott, A McDonald, B VanderSloot, R Hynes, ...
7th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2017
202017
DDoSCoin: Cryptocurrency with a malicious proof-of-work
E Wustrow, B VanderSloot
10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16), 2016
162016
Imperfect forward secrecy: How Diffie-Hellman fails in practice
D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ...
Communications of the ACM 62 (1), 106-114, 2018
142018
ExSpectre: Hiding Malware in Speculative Execution.
J Wampler, I Martiny, E Wustrow
NDSS, 2019
132019
Initial measurements of the cuban street network
EE P. Pujol, W Scott, E Wustrow, JA Halderman
Proceedings of the 2017 Internet Measurement Conference, 318-324, 2017
92017
Conjure: Summoning proxies from unused address space
S Frolov, J Wampler, SC Tan, JA Halderman, N Borisov, E Wustrow
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
72019
Breaking the trust dependence on third party processes for reconfigurable secure hardware
A Coughlin, G Cusack, J Wampler, E Keller, E Wustrow
Proceedings of the 2019 ACM/SIGDA International Symposium on Field …, 2019
62019
The system can't perform the operation now. Try again later.
Articles 1–20