Publications

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella-Béguelink and Paul Zimmermann
In Proc. 22nd ACM Conference on Computer and Communications Security (CCS '15), October 2015.

Replication Prohibited: Attacking Restricted Keyways with 3D Printing
Ben Burgess, Eric Wustrow, and J. Alex Halderman
In Proc. of the 9th USENIX Workshop on Offensive Technologies (WOOT '15), August 2015.

Security Analysis of a Full-Body Scanner
Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, and Hovav Shacham
In Proc. 23rd USENIX Security Symposium (USENIX '14), August 2014.

TapDance: End-to-Middle Anticensorship without Flow Blocking
Eric Wustrow, Colleen M. Swanson, and J. Alex Halderman
In Proc. 23rd USENIX Security Symposium (USENIX '14), August 2014.

Elliptic Curve Cryptography in Practice
Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, and Eric Wustrow
In Proc. 18th International Conference on Financial Cryptography and Data Security (FC '14), March 2014

ZMap: Fast Internet-wide Scanning and its Security Applications
Zakir Durumeric, Eric Wustrow, and J. Alex Halderman
In Proc. 22nd USENIX Security Symposium (USENIX '13), August 2013.

CAge: Taming Certificate Authorities by Inferring Restricted Scopes
James Kasten, Eric Wustrow, and J. Alex Halderman
In Proc. 17th International Conference on Financial Cryptography and Data Security (FC '13), April 2013

Mining Your Ps and Qs: Widespread Weak Keys In Network Devices
Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J. Alex Halderman
In Proc. 21st USENIX Security Symposium (USENIX '12), August 2012.
Awarded Best Paper

Attacking the Washington, D.C. Internet Voting System
Scott Wolchok, Eric Wustrow, Dawn Isabel and J. Alex Halderman
In Proc. 16th Financial Cryptography and Data Security (FC '12), February 2012.

Telex: Anticensorship in the Network Infrastructure
Eric Wustrow, Scott Wolchok, Ian Goldberg, and J. Alex Halderman
In Proc. 20th USENIX Security Symposium (USENIX '11), August 2011.
2012 PET Award Runner-up

Internet Background Radiation Revisited
Eric Wustrow, Manish Karir, Michael Bailey, Farnam Jahanian, and Geoff Huston.
In Internet Measurement Conference 2010 (IMC '10), November 2010.

Security Analysis of India's Electronic Voting Machines
Scott Wolchok, Eric Wustrow, J. Alex Halderman, Hari K. Prasad, Arun Kankipati, Sai Krishna Sakhamuri, Vasavya Yagati, and Rop Gonggrijp.
In Proc. 17th ACM Conference on Computer and Communications Security (CCS '10), October 2010.

PE-ARP: Port Enhanced ARP for IPv4 Address Sharing
Manish Karir, Eric Wustrow, and Jim Rees.
Merit Network Technical Report, July 2009.