Publications

How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic
Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, and Eric Wustrow
In USENIX Security 2023 (USENIX 2023)
FOCI Best Practical Paper (2023)
CSAW Applied Research Competition First Place (2023)
IRTF Applied Networking Research Prize (2024)

A Global Measurement of Routing Loops on the Internet
Abdulrahman Alaraj, Kevin Bock, Dave Levin, and Eric Wustrow
To appear Passive and Active Measurement Conference (PAM 2023), March 2023.

Where Have All the Paragraphs Gone? Detecting and Exposing Censorship in Chinese Translation
Mizhang Streisand, Eric Wustrow, and Amir Houmansadr
In Free and Open Communications on the Internet (FOCI 2023), February 2023.

Chasing Shadows: A security analysis of the ShadowTLS proxy
Gaukas Wang, Anonymous, Jackson Sippe, Hai Chi, and Eric Wustrow
In Free and Open Communications on the Internet (FOCI 2023), February 2023.

Open to a fault: On the passive compromise of TLS keys via transient errors
George Sullivan, Jackson Sippe, Nadia Heninger, and Eric Wustrow
In Proc. 31st USENIX Security Symposium (USENIX 2022), August 2022.

Throttling Twitter: An Emerging Censorship Technique in Russia (website)
Diwen Xue, Reethika Ramesh, ValdikSS, Leonid Evdokimov, Andrey Viktorov, Arham Jain, Eric Wustrow, Simone Basso, and Roya Ensafi
In Proc. of the 2021 Internet Measurement Conference (IMC 2021), November 2021.

Weaponizing Middleboxes for TCP Reflected Amplification (website)
Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, and Dave Levin
In Proc. 30th USENIX Security Symposium (USENIX 2021), August 2021.
Distinguished Paper and Third Prize of the 2021 Internet Defense Prize

Improving Signal's Sealed Sender
Ian Martiny, Gabriel Kaptchuk, Adam Aviv, Dan Roche, and Eric Wustrow
In Proc. of Network and Distributed System Security Symposium (NDSS 2021), February 2021.

Investigating Large Scale HTTPS Interception in Kazakhstan (website)
Ram Sundara Raman, Leonid Evdokimov, Eric Wustrow, J. Alex Halderman, and Roya Ensafi
In Proc. of the 2020 Internet Measurement Conference (IMC 2020), November 2020.

HTTPT: A Probe-Resistant Proxy
Sergey Frolov, and Eric Wustrow
In Proc. of USENIX Workshop on Free and Open Communications on the Internet (FOCI 2020), August 2020.

Running Refraction Networking for Real
Benjamin VanderSloot, Sergey Frolov, Jack Wampler, Sze Chuen Tan, Irv Simpson, Michalis Kallitsis, J. Alex Halderman, Nikita Borisov, and Eric Wustrow
In Proc. on Privacy Enhancing Technologies (PETS 2020), July 2020.

Detecting Probe-resistant Proxies
Sergey Frolov, Jack Wampler, and Eric Wustrow
In Proc. of Network and Distributed System Security Symposium (NDSS 2020), February 2020.

Conjure: Summoning Proxies from Unused Address Space
Sergey Frolov, Jack Wampler, Sze Chuen Tan, J. Alex Halderman, Nikita Borisov, and Eric Wustrow
In 26th ACM Conference on Computer and Communications Security (CCS 2019), November 2019.

This is Your President Speaking: Spoofing Alerts in 4G LTE Networks
Gyuhong Lee, Jihoon Lee, Jinsung Lee, Youngbin Im, Max Hollingsworth, Eric Wustrow, Dirk Grunwald, and Sangtae Ha
In Proc. of the 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys 2019), June 2019.
Awarded Best Paper

ExSpectre: Hiding Malware in Speculative Execution
Jack Wampler, Ian Martiny, and Eric Wustrow
In Proc. of Network and Distributed System Security Symposium (NDSS 2019), February 2019.

The use of TLS in Censorship Circumvention (website)
Sergey Frolov and Eric Wustrow
In Proc. of Network and Distributed System Security Symposium (NDSS 2019), February 2019.

Breaking the Trust Dependence on Third Party Processes for Reconfigurable Secure Hardware
Aimee Coughlin, Greg Cusack, Jack Wampler, Eric Keller, and Eric Wustrow
In Proc. 27th ACM/SIGDA International Symposium on Field-Programmable Gate Arrays (FPGA 2019), February 2019.

The Proof is in the Pudding - Proofs of Work for Solving Discrete Logarithms
Marcella Hastings, Nadia Heninger, and Eric Wustrow
In Proc. of the 23rd Intl. Conference on Financial Cryptography and Data Security (FC 2019), February 2019.

Proof-of-Censorship: Enabling Centralized Censorship-resistant Content Providers
Ian Martiny, Ian Miers, and Eric Wustrow
In Proc. of the 22nd Intl. Conference on Financial Cryptography and Data Security (FC 2018), February 2018.

Initial Measurements of the Cuban Street Network (Short paper)
Eduardo E P Pujol, Will Scott, Eric Wustrow, and J Alex Halderman
In Proc. of the 2017 Internet Measurement Conference (IMC 2017), November 2017.

An ISP-scale deployment of TapDance
Sergey Frolov, Fred Douglas, Will Scott, Allison McDonald, Benjamin Vander-Sloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G Robinson, Steve Schultze, Nikita Borisov, Alex Halderman, and Eric Wustrow
In Proc. of USENIX Workshop on Free and Open Communications on the Internet (FOCI 2017), August 2017

Trusted click: Overcoming security issues of NFV in the cloud
Michael Coughlin, Eric Keller, and Eric Wustrow
In Proc. of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFVSec), March 2017.

DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work
Eric Wustrow, and Benjamin VanderSloot
In Proc. of the 10th USENIX Workshop on Offensive Technologies (WOOT '16), August 2016.

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella-Béguelink and Paul Zimmermann
In Proc. 22nd ACM Conference on Computer and Communications Security (CCS '15), October 2015.

Replication Prohibited: Attacking Restricted Keyways with 3D Printing
Ben Burgess, Eric Wustrow, and J. Alex Halderman
In Proc. of the 9th USENIX Workshop on Offensive Technologies (WOOT '15), August 2015.

Security Analysis of a Full-Body Scanner
Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, and Hovav Shacham
In Proc. 23rd USENIX Security Symposium (USENIX '14), August 2014.

TapDance: End-to-Middle Anticensorship without Flow Blocking
Eric Wustrow, Colleen M. Swanson, and J. Alex Halderman
In Proc. 23rd USENIX Security Symposium (USENIX '14), August 2014.

Elliptic Curve Cryptography in Practice
Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, and Eric Wustrow
In Proc. 18th International Conference on Financial Cryptography and Data Security (FC '14), March 2014

ZMap: Fast Internet-wide Scanning and its Security Applications
Zakir Durumeric, Eric Wustrow, and J. Alex Halderman
In Proc. 22nd USENIX Security Symposium (USENIX '13), August 2013.

CAge: Taming Certificate Authorities by Inferring Restricted Scopes
James Kasten, Eric Wustrow, and J. Alex Halderman
In Proc. 17th International Conference on Financial Cryptography and Data Security (FC '13), April 2013

Mining Your Ps and Qs: Widespread Weak Keys In Network Devices
Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J. Alex Halderman
In Proc. 21st USENIX Security Symposium (USENIX '12), August 2012.
Awarded Best Paper

Attacking the Washington, D.C. Internet Voting System
Scott Wolchok, Eric Wustrow, Dawn Isabel and J. Alex Halderman
In Proc. 16th Financial Cryptography and Data Security (FC '12), February 2012.

Telex: Anticensorship in the Network Infrastructure
Eric Wustrow, Scott Wolchok, Ian Goldberg, and J. Alex Halderman
In Proc. 20th USENIX Security Symposium (USENIX '11), August 2011.
2012 PET Award Runner-up

Internet Background Radiation Revisited
Eric Wustrow, Manish Karir, Michael Bailey, Farnam Jahanian, and Geoff Huston.
In Internet Measurement Conference 2010 (IMC '10), November 2010.

Security Analysis of India's Electronic Voting Machines
Scott Wolchok, Eric Wustrow, J. Alex Halderman, Hari K. Prasad, Arun Kankipati, Sai Krishna Sakhamuri, Vasavya Yagati, and Rop Gonggrijp.
In Proc. 17th ACM Conference on Computer and Communications Security (CCS '10), October 2010.

PE-ARP: Port Enhanced ARP for IPv4 Address Sharing
Manish Karir, Eric Wustrow, and Jim Rees.
Merit Network Technical Report, July 2009.