Biblio

Export 10 results:
Filters: Author is Eric Wustrow  [Clear All Filters]
2021
Bock K, Alaraj A, Fax Y, Hurley K, Wustrow E, Levin D.  2021.  Weaponizing Middleboxes for TCP Reflected Amplification. 30th USENIX Security Symposium (USENIX Security 21). :3345--3361.
2020
Frolov S, Wustrow E.  2020.  HTTPT: A Probe-Resistant Proxy. 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20).
2017
Frolov S, Douglas F, Scott W, McDonald A, VanderSloot B, Hynes R, Kruger A, Kallitsis M, Robinson DG, Schultze S et al..  2017.  An ISP-Scale Deployment of TapDance . 7th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 17).
2016
Wustrow E, VanderSloot B.  2016.  DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work. 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16).
2015
Burgess B, Wustrow E, J. Halderman A.  2015.  Replication Prohibited: Attacking Restricted Keyways with 3D-Printing. 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15).
2014
Mowery K, Wustrow E, Wypych T, Singleton C, Comfort C, Rescorla E, J. Halderman A, Shacham H, Checkoway S.  2014.  Security Analysis of a Full-Body Scanner. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :369--384.
Wustrow E, Swanson CM, J. Halderman A.  2014.  TapDance: End-to-Middle Anticensorship without Flow Blocking. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :159--174.
2013
Durumeric Z, Wustrow E, J. Halderman A.  2013.  ZMap: Fast Internet-wide Scanning and Its Security Applications. 22nd {USENIX} Security Symposium ({USENIX} Security 13). :605--620.
2011
Wustrow E, Wolchok S, J. Halderman A.  2011.  Telex: Anticensorship in the Network Infrastructure. 20th {USENIX} Security Symposium ({USENIX} Security 11).