Biblio

Export 12 results:
Filters: Author is Eric Wustrow  [Clear All Filters]
2021
Bock K, Alaraj A, Fax Y, Hurley K, Wustrow E, Levin D.  2021.  Weaponizing Middleboxes for TCP Reflected Amplification. 30th USENIX Security Symposium (USENIX Security 21). :3345--3361.
2020
Frolov S, Wustrow E.  2020.  HTTPT: A Probe-Resistant Proxy. 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20).
2017
Frolov S, Douglas F, Scott W, McDonald A, VanderSloot B, Hynes R, Kruger A, Kallitsis M, Robinson DG, Schultze S et al..  2017.  An ISP-Scale Deployment of TapDance . 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17).
2016
Wustrow E, VanderSloot B.  2016.  DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work. 10th USENIX Workshop on Offensive Technologies (WOOT 16).
2014
Mowery K, Wustrow E, Wypych T, Singleton C, Comfort C, Rescorla E, J. Halderman A, Shacham H, Checkoway S.  2014.  Security Analysis of a Full-Body Scanner. 23rd USENIX Security Symposium (USENIX Security 14). :369--384.
Wustrow E, Swanson CM, J. Halderman A.  2014.  TapDance: End-to-Middle Anticensorship without Flow Blocking. 23rd USENIX Security Symposium (USENIX Security 14). :159--174.
2013
Durumeric Z, Wustrow E, J. Halderman A.  2013.  ZMap: Fast Internet-wide Scanning and Its Security Applications. 22nd USENIX Security Symposium (USENIX Security 13). :605--620.
2011
Wustrow E, Wolchok S, Goldberg I, J. Halderman A.  2011.  Telex: Anticensorship in the Network Infrastructure. 20th USENIX Security Symposium (USENIX Security 11).