Eric Wustrow

Orcid: 0000-0002-4679-8834

According to our database1, Eric Wustrow authored at least 42 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Verifying Indistinguishability of Privacy-Preserving Protocols.
Proc. ACM Program. Lang., October, 2023

Just add WATER: WebAssembly-based Circumvention Transports.
CoRR, 2023

How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic.
Proceedings of the 32nd USENIX Security Symposium, 2023

A Global Measurement of Routing Loops on the Internet.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023

You Can't See Me: Providing Privacy in Vision Pipelines via Wi-Fi Localization.
Proceedings of the 29th IEEE International Symposium on Local and Metropolitan Area Networks, 2023

2022
A Fresh Look at ECN Traversal in the Wild.
CoRR, 2022

Open to a fault: On the passive compromise of TLS keys via transient errors.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Securing the wireless emergency alerts system.
Commun. ACM, 2021

Weaponizing Middleboxes for TCP Reflected Amplification.
Proceedings of the 30th USENIX Security Symposium, 2021

Improving Signal's Sealed Sender.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Throttling Twitter: an emerging censorship technique in Russia.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

2020
Running Refraction Networking for Real.
Proc. Priv. Enhancing Technol., 2020

HTTPT: A Probe-Resistant Proxy.
Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet, 2020

Detecting Probe-resistant Proxies.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Investigating Large Scale HTTPS Interception in Kazakhstan.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

2019
Imperfect forward secrecy: how Diffie-Hellman fails in practice.
Commun. ACM, 2019

ExSpectre: Hiding Malware in Speculative Execution.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

The use of TLS in Censorship Circumvention.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

This is Your President Speaking: Spoofing Alerts in 4G LTE Networks.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

This is Your President Speaking: Spoofing Alerts in 4G LTE Networks.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Breaking the Trust Dependence on Third Party Processes for Reconfigurable Secure Hardware.
Proceedings of the 2019 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2019

Short Paper: The Proof is in the Pudding - Proofs of Work for Solving Discrete Logarithms.
Proceedings of the Financial Cryptography and Data Security, 2019

Conjure: Summoning Proxies from Unused Address Space.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms.
IACR Cryptol. ePrint Arch., 2018

Proof of Censorship: Enabling Centralized Censorship-Resistant Content Providers.
Proceedings of the Financial Cryptography and Data Security, 2018

2017
An ISP-Scale Deployment of TapDance.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017

Initial measurements of the cuban street network.
Proceedings of the 2017 Internet Measurement Conference, 2017

Trusted Click: Overcoming Security issues of NFV in the Cloud.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

2016
Security Hazards when Law is Code.
PhD thesis, 2016

DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

OverTorrent: Anticensorship without centralized servers.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

2015
Replication Prohibited: Attacking Restricted Keyways with 3D-Printing.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

2014
TapDance: End-to-Middle Anticensorship without Flow Blocking.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Security Analysis of a Full-Body Scanner.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
Elliptic Curve Cryptography in Practice.
IACR Cryptol. ePrint Arch., 2013

ZMap: Fast Internet-wide Scanning and Its Security Applications.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

CAge: Taming Certificate Authorities by Inferring Restricted Scopes.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Attacking the Washington, D.C. Internet Voting System.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Telex: Anticensorship in the Network Infrastructure.
Proceedings of the 20th USENIX Security Symposium, 2011

2010
Internet background radiation revisited.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

Security analysis of India's electronic voting machines.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010


  Loading...