Eric Wustrow

Google Scholar
27 publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China.
2025
conf/uss
Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China.
2023
conf/uss
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic.
2022
conf/uss
Open to a fault: On the passive compromise of TLS keys via transient errors.
2021
conf/uss
Weaponizing Middleboxes for TCP Reflected Amplification.
2021
conf/ndss
Improving Signal's Sealed Sender.
2020
conf/uss
HTTPT: A Probe-Resistant Proxy.
Sergey Frolov Eric Wustrow
2020
conf/ndss
Detecting Probe-resistant Proxies.
2019
conf/ndss
ExSpectre: Hiding Malware in Speculative Execution.
Jack Wampler Ian Martiny Eric Wustrow
2019
conf/ndss
The use of TLS in Censorship Circumvention.
Sergey Frolov Eric Wustrow
2014
conf/uss
TapDance: End-to-Middle Anticensorship without Flow Blocking.
2014
conf/uss
2013
conf/uss
ZMap: Fast Internet-wide Scanning and Its Security Applications.
2012
conf/uss
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices.
2011
conf/uss
Telex: Anticensorship in the Network Infrastructure.
Filters
Years:  to