Telex: anticensorship in the network infrastructure

Eric Wustrow , Scott Wolchok , Ian Goldberg , J Alex Halderman
usenix security symposium 30 -30

130
2011
Replication prohibited: attacking restricted keyways with 3D printing

Eric Wustrow , J. Alex Halderman , Ben Burgess
WOOT'15 Proceedings of the 9th USENIX Conference on Offensive Technologies 18 -18

2
2015
ZMap: fast internet-wide scanning and its security applications

Eric Wustrow , Zakir Durumeric , J. Alex Halderman
usenix security symposium 605 -620

879
2013
Mining your Ps and Qs: detection of widespread weak keys in network devices

Eric Wustrow , Zakir Durumeric , J. Alex Halderman , Nadia Heninger
usenix security symposium 35 -35

301
2012
Security analysis of a full-body scanner

Eric Wustrow , Hovav Shacham , J. Alex Halderman , Tom Wypych
usenix security symposium 369 -384

9
2014
DDoSCoin: cryptocurrency with a malicious proof-of-work

Eric Wustrow , Benjamin VanderSloot
WOOT'16 Proceedings of the 10th USENIX Conference on Offensive Technologies 168 -177

19
2016
An ISP-scale deployment of tapdance

Eric Wustrow , Benjamin VanderSloot , J. Alex Halderman , Will Scott
usenix security symposium

29
2017
The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms.

Eric Wustrow , Nadia Heninger , Marcella Hastings
IACR Cryptology ePrint Archive 2018 939

4
2018
Securing Early Software Development

Eric Wustrow , David Dagon , David Dagon , Michalis Faloutsos
usenix security symposium 663 -678

2012
Improving Signal's Sealed Sender

Eric Wustrow , Gabriel Kaptchuk , Ian Martiny , Adam Aviv
network and distributed system security symposium

2021
Weaponizing Middleboxes for {TCP} Reflected Amplification

Eric Wustrow , Kevin Bock , Dave Levin , Yair Fax
usenix security symposium

2021
Attacking the Washington, D.C. Internet Voting System

Scott Wolchok , Eric Wustrow , Dawn Isabel , J. Alex Halderman
financial cryptography 114 -128

64
2012
Running Refraction Networking for Real

Benjamin VanderSloot , Sergey Frolov , Jack Wampler , Sze Chuen Tan
privacy enhancing technologies 2020 ( 4) 321 -335

10
2020
Initial measurements of the cuban street network

Eduardo E. P. Pujol , Will Scott , Eric Wustrow , J. Alex Halderman
internet measurement conference 318 -324

5
2017
Proof of Censorship: Enabling Centralized Censorship-Resistant Content Providers

Ian Martiny , Ian Miers , Eric Wustrow
financial cryptography 99 -115

1
2018
Trusted Click: Overcoming Security issues of NFV in the Cloud

Aimee Mikaela Coughlin , Eric Keller , Eric Wustrow ,
international workshop on security 31 -36

35
2017
ExSpectre: Hiding Malware in Speculative Execution.

Jack Wampler , Ian Martiny , Eric Wustrow
network and distributed system security symposium

12
2019
The use of TLS in Censorship Circumvention

Sergey Frolov , Eric Wustrow
Proceedings 2019 Network and Distributed System Security Symposium

20
2019
Detecting Probe-resistant Proxies

Sergey Frolov , Jack Wampler , Eric Wustrow
Proceedings 2020 Network and Distributed System Security Symposium

1
2020
Internet background radiation revisited

Eric Wustrow , Manish Karir , Michael Bailey , Farnam Jahanian
internet measurement conference 62 -74

188
2010