scispace - formally typeset
E

Eric Wustrow

Researcher at University of Colorado Boulder

Publications -  39
Citations -  2878

Eric Wustrow is an academic researcher from University of Colorado Boulder. The author has contributed to research in topics: The Internet & Computer science. The author has an hindex of 15, co-authored 36 publications receiving 2523 citations. Previous affiliations of Eric Wustrow include University of Michigan & Merit Network.

Papers
More filters
Proceedings Article

ZMap: fast internet-wide scanning and its security applications

TL;DR: ZMap is introduced, a modular, open-source network scanner specifically architected to perform Internet-wide scans and capable of surveying the entire IPv4 address space in under 45 minutes from user space on a single machine, approaching the theoretical maximum speed of gigabit Ethernet.
Proceedings Article

Mining your Ps and Qs: detection of widespread weak keys in network devices

TL;DR: The largest ever network survey of TLS and SSH servers is performed and evidence that vulnerable keys are surprisingly widespread is presented, including a boot-time entropy hole in the Linux random number generator.
Proceedings ArticleDOI

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

TL;DR: Logjam, a novel flaw in TLS that lets a man-in-the-middle downgrade connections to "export-grade" Diffie-Hellman, is presented and a close reading of published NSA leaks shows that the agency's attacks on VPNs are consistent with having achieved a break.
Proceedings Article

Telex: anticensorship in the network infrastructure

TL;DR: A new cryptographic scheme based on elliptic curves for tagging TLS handshakes such that the tag is visible to a Telex station but not to a censor, which is used to build a protocol that allows clients to connect to Telex stations while resisting both passive and active attacks.
Proceedings ArticleDOI

Security analysis of India's electronic voting machines

TL;DR: It is concluded that in spite of the EVM machines' simplicity and minimal software trusted computing base, they are vulnerable to serious attacks that can alter election results and violate the secrecy of the ballot.