default search action
Eric Wustrow
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c37]Zakir Durumeric, David Adrian, Phillip Stephens, Eric Wustrow, J. Alex Halderman:
Ten Years of ZMap. IMC 2024: 139-148 - [i5]Zakir Durumeric, David Adrian, Phillip Stephens, Eric Wustrow, J. Alex Halderman:
Ten Years of ZMap. CoRR abs/2406.15585 (2024) - 2023
- [j4]Kirby Linvill, Gowtham Kaki, Eric Wustrow:
Verifying Indistinguishability of Privacy-Preserving Protocols. Proc. ACM Program. Lang. 7(OOPSLA2): 1442-1469 (2023) - [c36]Shazal Irshad, Ria Thakkar, Eric Rozner, Eric Wustrow:
You Can't See Me: Providing Privacy in Vision Pipelines via Wi-Fi Localization. LANMAN 2023: 1-6 - [c35]Abdulrahman Alaraj, Kevin Bock, Dave Levin, Eric Wustrow:
A Global Measurement of Routing Loops on the Internet. PAM 2023: 373-399 - [c34]Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow:
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic. USENIX Security Symposium 2023: 2653-2670 - [i4]Erik Chi, Gaukas Wang, J. Alex Halderman, Eric Wustrow, Jack Wampler:
Just add WATER: WebAssembly-based Circumvention Transports. CoRR abs/2312.00163 (2023) - 2022
- [c33]George Arnold Sullivan, Jackson Sippe, Nadia Heninger, Eric Wustrow:
Open to a fault: On the passive compromise of TLS keys via transient errors. USENIX Security Symposium 2022: 233-250 - [i3]Hyoyoung Lim, Seonwoo Kim, Jackson Sippe, Junseon Kim, Greg White, Chul-Ho Lee, Eric Wustrow, Kyunghan Lee, Dirk Grunwald, Sangtae Ha:
A Fresh Look at ECN Traversal in the Wild. CoRR abs/2208.14523 (2022) - 2021
- [j3]Jihoon Lee, Gyuhong Lee, Jinsung Lee, Youngbin Im, Max Hollingsworth, Eric Wustrow, Dirk Grunwald, Sangtae Ha:
Securing the wireless emergency alerts system. Commun. ACM 64(10): 85-93 (2021) - [c32]Diwen Xue, Reethika Ramesh, Valdik S. S, Leonid Evdokimov, Andrey Viktorov, Arham Jain, Eric Wustrow, Simone Basso, Roya Ensafi:
Throttling Twitter: an emerging censorship technique in Russia. Internet Measurement Conference 2021: 435-443 - [c31]Ian Martiny, Gabriel Kaptchuk, Adam J. Aviv, Daniel S. Roche, Eric Wustrow:
Improving Signal's Sealed Sender. NDSS 2021 - [c30]Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin:
Weaponizing Middleboxes for TCP Reflected Amplification. USENIX Security Symposium 2021: 3345-3361 - 2020
- [j2]Benjamin VanderSloot, Sergey Frolov, Jack Wampler, Sze Chuen Tan, Irv Simpson, Michalis Kallitsis, J. Alex Halderman, Nikita Borisov, Eric Wustrow:
Running Refraction Networking for Real. Proc. Priv. Enhancing Technol. 2020(4): 321-335 (2020) - [c29]Ram Sundara Raman, Leonid Evdokimov, Eric Wustrow, J. Alex Halderman, Roya Ensafi:
Investigating Large Scale HTTPS Interception in Kazakhstan. Internet Measurement Conference 2020: 125-132 - [c28]Sergey Frolov, Jack Wampler, Eric Wustrow:
Detecting Probe-resistant Proxies. NDSS 2020 - [c27]Sergey Frolov, Eric Wustrow:
HTTPT: A Probe-Resistant Proxy. FOCI @ USENIX Security Symposium 2020
2010 – 2019
- 2019
- [j1]David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella Béguelin, Paul Zimmermann:
Imperfect forward secrecy: how Diffie-Hellman fails in practice. Commun. ACM 62(1): 106-114 (2019) - [c26]Sergey Frolov, Jack Wampler, Sze Chuen Tan, J. Alex Halderman, Nikita Borisov, Eric Wustrow:
Conjure: Summoning Proxies from Unused Address Space. CCS 2019: 2215-2229 - [c25]Marcella Hastings, Nadia Heninger, Eric Wustrow:
Short Paper: The Proof is in the Pudding - Proofs of Work for Solving Discrete Logarithms. Financial Cryptography 2019: 396-404 - [c24]Aimee Coughlin, Greg Cusack, Jack Wampler, Eric Keller, Eric Wustrow:
Breaking the Trust Dependence on Third Party Processes for Reconfigurable Secure Hardware. FPGA 2019: 282-291 - [c23]Gyuhong Lee, Ji Hoon Lee, Jinsung Lee, Youngbin Im, Max Hollingsworth, Eric Wustrow, Dirk Grunwald, Sangtae Ha:
This is Your President Speaking: Spoofing Alerts in 4G LTE Networks. MobiSys 2019: 404-416 - [c22]Max Hollingsworth, Gyuhong Lee, Jihoon Lee, Jinsung Lee, Youngbin Im, Eric Wustrow, Dirk Grunwald, Sangtae Ha:
This is Your President Speaking: Spoofing Alerts in 4G LTE Networks. MobiSys 2019: 663-664 - [c21]Sergey Frolov, Eric Wustrow:
The use of TLS in Censorship Circumvention. NDSS 2019 - [c20]Jack Wampler, Ian Martiny, Eric Wustrow:
ExSpectre: Hiding Malware in Speculative Execution. NDSS 2019 - 2018
- [c19]Sergey Frolov, Eric Wustrow, Frederick Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman:
An ISP-Scale Deployment of TapDance. ANRW 2018: 22 - [c18]Ian Martiny, Ian Miers, Eric Wustrow:
Proof of Censorship: Enabling Centralized Censorship-Resistant Content Providers. Financial Cryptography 2018: 99-115 - [i2]Marcella Hastings, Nadia Heninger, Eric Wustrow:
The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms. IACR Cryptol. ePrint Arch. 2018: 939 (2018) - 2017
- [c17]Michael Coughlin, Eric Keller, Eric Wustrow:
Trusted Click: Overcoming Security issues of NFV in the Cloud. SDN-NFV@CODASPY 2017: 31-36 - [c16]Eduardo E. P. Pujol, Will Scott, Eric Wustrow, J. Alex Halderman:
Initial measurements of the cuban street network. Internet Measurement Conference 2017: 318-324 - [c15]Sergey Frolov, Frederick Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman, Eric Wustrow:
An ISP-Scale Deployment of TapDance. FOCI @ USENIX Security Symposium 2017 - 2016
- [b1]Eric Wustrow:
Security Hazards when Law is Code. University of Michigan, USA, 2016 - [c14]Yu-Ju Lee, Eric Wustrow:
OverTorrent: Anticensorship without centralized servers. PST 2016: 388-391 - [c13]Eric Wustrow, Benjamin VanderSloot:
DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work. WOOT 2016 - 2015
- [c12]David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella Béguelin, Paul Zimmermann:
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. CCS 2015: 5-17 - [c11]Ben Burgess, Eric Wustrow, J. Alex Halderman:
Replication Prohibited: Attacking Restricted Keyways with 3D-Printing. WOOT 2015 - 2014
- [c10]Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow:
Elliptic Curve Cryptography in Practice. Financial Cryptography 2014: 157-175 - [c9]Eric Wustrow, Colleen Swanson, J. Alex Halderman:
TapDance: End-to-Middle Anticensorship without Flow Blocking. USENIX Security Symposium 2014: 159-174 - [c8]Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, J. Alex Halderman, Hovav Shacham, Stephen Checkoway:
Security Analysis of a Full-Body Scanner. USENIX Security Symposium 2014: 369-384 - 2013
- [c7]James Kasten, Eric Wustrow, J. Alex Halderman:
CAge: Taming Certificate Authorities by Inferring Restricted Scopes. Financial Cryptography 2013: 329-337 - [c6]Zakir Durumeric, Eric Wustrow, J. Alex Halderman:
ZMap: Fast Internet-wide Scanning and Its Security Applications. USENIX Security Symposium 2013: 605-620 - [i1]Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow:
Elliptic Curve Cryptography in Practice. IACR Cryptol. ePrint Arch. 2013: 734 (2013) - 2012
- [c5]Scott Wolchok, Eric Wustrow, Dawn Isabel, J. Alex Halderman:
Attacking the Washington, D.C. Internet Voting System. Financial Cryptography 2012: 114-128 - [c4]Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderman:
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. USENIX Security Symposium 2012: 205-220 - 2011
- [c3]Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman:
Telex: Anticensorship in the Network Infrastructure. USENIX Security Symposium 2011 - 2010
- [c2]Scott Wolchok, Eric Wustrow, J. Alex Halderman, Hari K. Prasad, Arun Kankipati, Sai Krishna Sakhamuri, Vasavya Yagati, Rop Gonggrijp:
Security analysis of India's electronic voting machines. CCS 2010: 1-14 - [c1]Eric Wustrow, Manish Karir, Michael D. Bailey, Farnam Jahanian, Geoff Huston:
Internet background radiation revisited. Internet Measurement Conference 2010: 62-74
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint