OverTorrent: Anticensorship without centralized servers

Yu-Ju Lee , Eric Wustrow
conference on privacy security and trust 388 -391

2016
CAge: Taming Certificate Authorities by Inferring Restricted Scopes

James Kasten , Eric Wustrow , J. Alex Halderman
financial cryptography 329 -337

51
2013
Elliptic Curve Cryptography in Practice

Joppe W. Bos , J. Alex Halderman , Nadia Heninger , Jonathan Moore
Financial Cryptography and Data Security 157 -175

323
2014
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

David Adrian , Karthikeyan Bhargavan , Zakir Durumeric , Pierrick Gaudry
computer and communications security 5 -17

208
2015
Conjure: Summoning Proxies from Unused Address Space

Sergey Frolov , Jack Wampler , Sze Chuen Tan , J. Alex Halderman
computer and communications security 2215 -2229

19
2019
Breaking the Trust Dependence on Third Party Processes for Reconfigurable Secure Hardware

Aimee Coughlin , Greg Cusack , Jack Wampler , Eric Keller
field programmable gate arrays 282 -291

4
2019
Security analysis of India's electronic voting machines

Scott Wolchok , Eric Wustrow , J. Alex Halderman , Hari K. Prasad
Proceedings of the 17th ACM conference on Computer and communications security - CCS '10 1 -14

238
2010
The LOGJAM attack

Imperfect Forward Secrecy , David Adrian , Karthikeyan Bhargavan , Zakir Durumeric

Just add WATER: WebAssembly-based circumvention transports

Erik Chi , Gaukas Wang , J Alex Halderman , Eric Wustrow
arXiv preprint arXiv:2312.00163

2023
Throttling Twitter: an emerging censorship technique in Russia

Diwen Xue , Reethika Ramesh , Leonid Evdokimov , Andrey Viktorov
435 -443

21
2021
This is your president speaking: Spoofing alerts in 4G LTE networks

Gyuhong Lee , Jihoon Lee , Jinsung Lee , Youngbin Im
404 -416

35
2019
A Fresh Look at ECN Traversal in the Wild

Hyoyoung Lim , Seonwoo Kim , Jackson Sippe , Junseon Kim
arXiv preprint arXiv:2208.14523

1
2022
Securing the wireless emergency alerts system

Jihoon Lee , Gyuhong Lee , Jinsung Lee , Youngbin Im
Communications of the ACM 64 ( 10) 85 -93

1
2021
DEMO–This is Your President Speaking: Spoofing Alerts in 4G LTE Networks

Max Hollingsworth , Gyuhong Lee , Jihoon Lee , Jinsung Lee

2019
How the Great Firewall of China detects and blocks fully encrypted traffic

Mingshi Wu , Jackson Sippe , Danesh Sivakumar , Jack Burg
32nd USENIX Security Symposium (USENIX Security 23) 2653 -2670

20
2023
A Global Measurement of Routing Loops on the Internet

Abdulrahman Alaraj , Kevin Bock , Dave Levin , Eric Wustrow
Springer Nature Switzerland 373 -399

2
2023
PE-ARP: Port Enhanced ARP for IPv4 Address Sharing

Manish Karir , Eric Wustrow , Jim Rees
http://www. nanog. org/meetings/nanog47/abstracts. php? pt= MTQ2MSZuYW5vZzQ3&nm= nanog47

1
2009
Open to a fault: On the passive compromise of {TLS} keys via transient errors

George Arnold Sullivan , Jackson Sippe , Nadia Heninger , Eric Wustrow
31st USENIX Security Symposium (USENIX Security 22) 233 -250

11
2022