Eric Wustrow
University of Colorado Boulder
H-index: 19
North America-United States
Top articles of Eric Wustrow
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Oscur0: One-Shot Circumvention without Registration | Free and Open Communications on the Internet | Mingye Chen Jack Wampler Abdulrahman Alaraj Gaukas Wang Eric Wustrow | 2024 |
Chasing Shadows: A security analysis of the ShadowTLS proxy | Free and Open Communications on the Internet | Gaukas Wang Jackson Sippe Hai Chi Eric Wustrow | 2023 |
Just add WATER: WebAssembly-based Circumvention Transports | arXiv preprint arXiv:2312.00163 | Erik Chi Gaukas Wang J Alex Halderman Eric Wustrow Jack Wampler | 2023/11/30 |
Verifying Indistinguishability of Privacy-Preserving Protocols | Proceedings of the ACM on Programming Languages | Kirby Linvill Gowtham Kaki Eric Wustrow | 2023/10/16 |
Where Have All the Paragraphs Gone? Detecting and Exposing Censorship in Chinese Translation | Free and Open Communications on the Internet | Mizhang Streisand Eric Wustrow Amir Houmansadr | 2023 |
You Can't See Me: Providing Privacy in Vision Pipelines via Wi-Fi Localization | Shazal Irshad Ria Thakkar Eric Rozner Eric Wustrow | 2023/7/10 | |
A Global Measurement of Routing Loops on the Internet | Abdulrahman Alaraj Kevin Bock Dave Levin Eric Wustrow | 2023/3/10 | |
How the Great Firewall of China detects and blocks fully encrypted traffic | Mingshi Wu Jackson Sippe Danesh Sivakumar Jack Burg Peter Anderson | 2023 | |
A Fresh Look at ECN Traversal in the Wild | arXiv preprint arXiv:2208.14523 | Hyoyoung Lim Seonwoo Kim Jackson Sippe Junseon Kim Greg White | 2022/8/30 |
Open to a fault: On the passive compromise of {TLS} keys via transient errors | George Arnold Sullivan Jackson Sippe Nadia Heninger Eric Wustrow | 2022 | |
Securing the wireless emergency alerts system | Communications of the ACM | Jihoon Lee Gyuhong Lee Jinsung Lee Youngbin Im Max Hollingsworth | 2021/9/22 |
Improving Signal's Sealed Sender. | Ian Martiny Gabriel Kaptchuk Adam J Aviv Daniel S Roche Eric Wustrow | 2021/2/21 | |
Weaponizing middleboxes for {TCP} reflected amplification | Kevin Bock Abdulrahman Alaraj Yair Fax Kyle Hurley Eric Wustrow | 2021 | |
Throttling Twitter: an emerging censorship technique in Russia | Diwen Xue Reethika Ramesh Valdik S S Leonid Evdokimov Andrey Viktorov | 2021/11/2 | |
Detecting Probe-resistant Proxies. | Sergey Frolov Jack Wampler Eric Wustrow | 2020 | |
{HTTPT}: A {Probe-Resistant} Proxy | Sergey Frolov Eric Wustrow | 2020 | |
Running refraction networking for real | Proceedings on Privacy Enhancing Technologies | Benjamin VanderSloot Sergey Frolov Jack Wampler Sze Chuen Tan Irv Simpson | 2020 |