
views: 71
Eric Wustrow
Assistant Professor
Sign in to view more

Ego Network
D-Core
Research Interests
Author Statistics
Experience
Sign in to view more
Education
Sign in to view more
Bio
Research
My research focuses on computer security from a systems perspective. My work has spanned censorship resistance, Internet protocol security, and embedded systems security.
I have exposed vulnerabilities in insecure electronic voting systems in the U.S. and abroad, developed detection techniques that uncovered weaknesses in widespread cryptographic protocol implementations, and created systems for circumventing large-scale Internet censorship in countries such as Iran and China.
My research focuses on computer security from a systems perspective. My work has spanned censorship resistance, Internet protocol security, and embedded systems security.
I have exposed vulnerabilities in insecure electronic voting systems in the U.S. and abroad, developed detection techniques that uncovered weaknesses in widespread cryptographic protocol implementations, and created systems for circumventing large-scale Internet censorship in countries such as Iran and China.
Papers34 papers
Sort
By YearBy Citation
Benjamin VanderSloot, Sergey Frolov, Jack Wampler, Sze Chuen Tan, Irv Simpson, Michalis Kallitsis,J. Alex Halderman,Nikita Borisov,Eric Wustrow
privacy enhancing technologies, no. 4 (2020): 321-335
Financial Cryptography, pp.396-404, (2019)
financial cryptography, pp.396-404, (2019)
Bibtex
Gyuhong Lee, Ji Hoon Lee,Jinsung Lee,Youngbin Im, Max Hollingsworth,Eric Wustrow,Dirk Grunwald,Sangtae Ha
international conference on mobile systems applications and services, pp.404-416, (2019)
Cited by4Bibtex
FPGA, pp.282-291, (2019)
Max Hollingsworth, Gyuhong Lee, Jihoon Lee,Jinsung Lee,Youngbin Im,Eric Wustrow,Dirk Grunwald,Sangtae Ha
Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Service..., pp.663-664, (2019)
NDSS, (2019)
Financial Cryptography, pp.99-115, (2018)
Communications of the ACM, no. 1 (2018): 106-114
IACR Cryptology ePrint Archive, (2018)
IMC, pp.318-324, (2017)
SDN-NFV@CODASPY, pp.31-36, (2017)
Sergey Frolov, Frederick Douglas,Will Scott, Allison McDonald,Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze,Nikita Borisov,J. Alex Halderman
FOCI @ USENIX Security Symposium, pp.22, (2017)
Yu-Ju Lee,Eric Wustrow
2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), pp.388-391, (2016)
ACM Conference on Computer and Communications Security, no. 1 (2015)
WOOT, (2015)
WOOT'15 Proceedings of the 9th USENIX Conference on Offensive Technologies, pp.18-18, (2015)
View All