What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Eric Wustrow
Google Scholar
27
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
A Wall Behind A Wall: Emerging Regional Censorship in China.
Mingshi Wu
Ali Zohaib
Zakir Durumeric
Amir Houmansadr
Eric Wustrow
2025
conf/ndss
Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China.
Shencha Fan
Jackson Sippe
Sakamoto San
Jade Sheffey
David Fifield
Amir Houmansadr
Elson Wedwards
Eric Wustrow
2025
conf/asiaccs
Proxies as Sensors: Measuring Censorship of Refraction Networking in Iran.
Abdulrahman Alaraj
Eric Wustrow
2025
conf/uss
Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China.
Ali Zohaib
Qiang Zao
Jackson Sippe
Abdulrahman Alaraj
Amir Houmansadr
Zakir Durumeric
Eric Wustrow
2023
conf/uss
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic.
Mingshi Wu
Jackson Sippe
Danesh Sivakumar
Jack Burg
Peter Anderson
Xiaokang Wang
Kevin Bock
Amir Houmansadr
Dave Levin
Eric Wustrow
2022
conf/uss
Open to a fault: On the passive compromise of TLS keys via transient errors.
George Arnold Sullivan
Jackson Sippe
Nadia Heninger
Eric Wustrow
2021
conf/uss
Weaponizing Middleboxes for TCP Reflected Amplification.
Kevin Bock
Abdulrahman Alaraj
Yair Fax
Kyle Hurley
Eric Wustrow
Dave Levin
2021
conf/ndss
Improving Signal's Sealed Sender.
Ian Martiny
Gabriel Kaptchuk
Adam J. Aviv
Daniel S. Roche
Eric Wustrow
2020
journals/popets
Running Refraction Networking for Real.
Benjamin VanderSloot
Sergey Frolov
Jack Wampler
Sze Chuen Tan
Irv Simpson
Michalis Kallitsis
J. Alex Halderman
Nikita Borisov
Eric Wustrow
2020
conf/uss
HTTPT: A Probe-Resistant Proxy.
Sergey Frolov
Eric Wustrow
2020
conf/ndss
Detecting Probe-resistant Proxies.
Sergey Frolov
Jack Wampler
Eric Wustrow
2019
conf/ccs
Conjure: Summoning Proxies from Unused Address Space.
Sergey Frolov
Jack Wampler
Sze Chuen Tan
J. Alex Halderman
Nikita Borisov
Eric Wustrow
2019
conf/fc
Short Paper: The Proof is in the Pudding - Proofs of Work for Solving Discrete Logarithms.
Marcella Hastings
Nadia Heninger
Eric Wustrow
2019
conf/ndss
ExSpectre: Hiding Malware in Speculative Execution.
Jack Wampler
Ian Martiny
Eric Wustrow
2019
conf/ndss
The use of TLS in Censorship Circumvention.
Sergey Frolov
Eric Wustrow
2018
conf/fc
Proof of Censorship: Enabling Centralized Censorship-Resistant Content Providers.
Ian Martiny
Ian Miers
Eric Wustrow
2017
conf/uss
An ISP-Scale Deployment of TapDance.
Sergey Frolov
Frederick Douglas
Will Scott
Allison McDonald
Benjamin VanderSloot
Rod Hynes
Adam Kruger
Michalis Kallitsis
David G. Robinson
Steve Schultze
Nikita Borisov
J. Alex Halderman
Eric Wustrow
2015
conf/ccs
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice.
David Adrian
Karthikeyan Bhargavan
Zakir Durumeric
Pierrick Gaudry
Matthew Green
J. Alex Halderman
Nadia Heninger
Drew Springall
Emmanuel Thomé
Luke Valenta
Benjamin VanderSloot
Eric Wustrow
Santiago Zanella-Béguelin
Paul Zimmermann
2014
conf/uss
TapDance: End-to-Middle Anticensorship without Flow Blocking.
Eric Wustrow
Colleen Swanson
J. Alex Halderman
2014
conf/uss
Security Analysis of a Full-Body Scanner.
Keaton Mowery
Eric Wustrow
Tom Wypych
Corey Singleton
Chris Comfort
Eric Rescorla
J. Alex Halderman
Hovav Shacham
Stephen Checkoway
2014
conf/fc
Elliptic Curve Cryptography in Practice.
Joppe W. Bos
J. Alex Halderman
Nadia Heninger
Jonathan Moore
Michael Naehrig
Eric Wustrow
2013
conf/uss
ZMap: Fast Internet-wide Scanning and Its Security Applications.
Zakir Durumeric
Eric Wustrow
J. Alex Halderman
2013
conf/fc
CAge: Taming Certificate Authorities by Inferring Restricted Scopes.
James Kasten
Eric Wustrow
J. Alex Halderman
2012
conf/uss
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices.
Nadia Heninger
Zakir Durumeric
Eric Wustrow
J. Alex Halderman
2012
conf/fc
Attacking the Washington, D.C. Internet Voting System.
Scott Wolchok
Eric Wustrow
Dawn Isabel
J. Alex Halderman
2011
conf/uss
Telex: Anticensorship in the Network Infrastructure.
Eric Wustrow
Scott Wolchok
Ian Goldberg
J. Alex Halderman
2010
conf/ccs
Security analysis of India's electronic voting machines.
Scott Wolchok
Eric Wustrow
J. Alex Halderman
Hari K. Prasad
Arun Kankipati
Sai Krishna Sakhamuri
Vasavya Yagati
Rop Gonggrijp
Coauthors
Abdulrahman Alaraj
(3)
Adam J. Aviv
(1)
Adam Kruger
(1)
Ali Zohaib
(2)
Allison McDonald
(1)
Amir Houmansadr
(4)
Arun Kankipati
(1)
Benjamin VanderSloot
(3)
Chris Comfort
(1)
Colleen Swanson
(1)
Corey Singleton
(1)
Danesh Sivakumar
(1)
Daniel S. Roche
(1)
Dave Levin
(2)
David Adrian
(1)
David Fifield
(1)
David G. Robinson
(1)
Dawn Isabel
(1)
Drew Springall
(1)
Elson Wedwards
(1)
Emmanuel Thomé
(1)
Eric Rescorla
(1)
Eric Wustrow
(27)
Frederick Douglas
(1)
Gabriel Kaptchuk
(1)
George Arnold Sullivan
(1)
Hari K. Prasad
(1)
Hovav Shacham
(1)
Ian Goldberg
(1)
Ian Martiny
(3)
Ian Miers
(1)
Irv Simpson
(1)
J. Alex Halderman
(13)
Jack Burg
(1)
Jack Wampler
(4)
Jackson Sippe
(4)
Jade Sheffey
(1)
James Kasten
(1)
Jonathan Moore
(1)
Joppe W. Bos
(1)
Karthikeyan Bhargavan
(1)
Keaton Mowery
(1)
Kevin Bock
(2)
Kyle Hurley
(1)
Luke Valenta
(1)
Marcella Hastings
(1)
Matthew Green
(1)
Michael Naehrig
(1)
Michalis Kallitsis
(2)
Mingshi Wu
(2)
Nadia Heninger
(5)
Nikita Borisov
(3)
Paul Zimmermann
(1)
Peter Anderson
(1)
Pierrick Gaudry
(1)
Qiang Zao
(1)
Rod Hynes
(1)
Rop Gonggrijp
(1)
Sai Krishna Sakhamuri
(1)
Sakamoto San
(1)
Santiago Zanella-Béguelin
(1)
Scott Wolchok
(3)
Sergey Frolov
(6)
Shencha Fan
(1)
Stephen Checkoway
(1)
Steve Schultze
(1)
Sze Chuen Tan
(2)
Tom Wypych
(1)
Vasavya Yagati
(1)
Will Scott
(1)
Xiaokang Wang
(1)
Yair Fax
(1)
Zakir Durumeric
(5)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to