Follow
Jacob Maskiewicz
Jacob Maskiewicz
Verified email at cs.ucsd.edu - Homepage
Title
Cited by
Cited by
Year
On the practical exploitability of dual {EC} in {TLS} implementations
S Checkoway, R Niederhagen, A Everspaugh, M Green, T Lange, ...
23rd USENIX security symposium (USENIX security 14), 319-335, 2014
1862014
A Systematic Analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1102016
Mouse trap: Exploiting firmware updates in {USB} peripherals
J Maskiewicz, B Ellis, J Mouradian, H Shacham
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
552014
Where did i leave my keys? Lessons from the juniper dual ec incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Communications of the ACM 61 (11), 148-155, 2018
62018
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Communications of the ACM 61 (11), 148-155, 2018
2018
A Systematic Analysis of the Juniper Dual EC Incident
JE Maskiewicz
UC San Diego, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–6