ZMap: Fast Internet-wide scanning and its security applications Z Durumeric, E Wustrow, JA Halderman 22nd {USENIX} Security Symposium ({USENIX} Security 13), 605-620, 2013 | 652 | 2013 |
Imperfect forward secrecy: How Diffie-Hellman fails in practice D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 483 | 2015 |
Mining your Ps and Qs: Detection of widespread weak keys in network devices N Heninger, Z Durumeric, E Wustrow, JA Halderman 21st {USENIX} Security Symposium ({USENIX} Security 12), 205-220, 2012 | 451 | 2012 |
Elliptic curve cryptography in practice JW Bos, JA Halderman, N Heninger, J Moore, M Naehrig, E Wustrow International Conference on Financial Cryptography and Data Security, 157-175, 2014 | 246 | 2014 |
Telex: Anticensorship in the Network Infrastructure. E Wustrow, S Wolchok, I Goldberg, JA Halderman USENIX Security Symposium, 45, 2011 | 198 | 2011 |
Security analysis of India's electronic voting machines S Wolchok, E Wustrow, JA Halderman, HK Prasad, A Kankipati, ... Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 188 | 2010 |
Internet background radiation revisited E Wustrow, M Karir, M Bailey, F Jahanian, G Huston Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 62-74, 2010 | 159 | 2010 |
Attacking the Washington, DC Internet voting system S Wolchok, E Wustrow, D Isabel, JA Halderman International Conference on Financial Cryptography and Data Security, 114-128, 2012 | 143 | 2012 |
Tapdance: End-to-middle anticensorship without flow blocking E Wustrow, CM Swanson, JA Halderman 23rd {USENIX} Security Symposium ({USENIX} Security 14), 159-174, 2014 | 68 | 2014 |
Cage: Taming certificate authorities by inferring restricted scopes J Kasten, E Wustrow, JA Halderman International Conference on Financial Cryptography and Data Security, 329-337, 2013 | 38 | 2013 |
Trusted click: overcoming security issues of NFV in the cloud M Coughlin, E Keller, E Wustrow Proceedings of the ACM International Workshop on Security in Software …, 2017 | 37 | 2017 |
Security analysis of a full-body scanner K Mowery, E Wustrow, T Wypych, C Singleton, C Comfort, E Rescorla, ... 23rd {USENIX} Security Symposium ({USENIX} Security 14), 369-384, 2014 | 22 | 2014 |
The use of TLS in Censorship Circumvention. S Frolov, E Wustrow NDSS, 2019 | 21 | 2019 |
An ISP-scale deployment of TapDance S Frolov, F Douglas, W Scott, A McDonald, B VanderSloot, R Hynes, ... 7th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2017 | 17 | 2017 |
DDoSCoin: Cryptocurrency with a malicious proof-of-work E Wustrow, B VanderSloot 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16), 2016 | 14 | 2016 |
Imperfect forward secrecy: How Diffie-Hellman fails in practice D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ... Communications of the ACM 62 (1), 106-114, 2018 | 10 | 2018 |
ExSpectre: Hiding Malware in Speculative Execution. J Wampler, I Martiny, E Wustrow NDSS, 2019 | 9 | 2019 |
Initial measurements of the cuban street network EE P. Pujol, W Scott, E Wustrow, JA Halderman Proceedings of the 2017 Internet Measurement Conference, 318-324, 2017 | 9 | 2017 |
Conjure: Summoning proxies from unused address space S Frolov, J Wampler, SC Tan, JA Halderman, N Borisov, E Wustrow Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 6 | 2019 |
This is your president speaking: Spoofing alerts in 4G LTE networks G Lee, J Lee, J Lee, Y Im, M Hollingsworth, E Wustrow, D Grunwald, S Ha Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019 | 5 | 2019 |