On the practical exploitability of dual {EC} in {TLS} implementations S Checkoway, R Niederhagen, A Everspaugh, M Green, T Lange, ... 23rd USENIX security symposium (USENIX security 14), 319-335, 2014 | 195 | 2014 |
A Systematic Analysis of the Juniper Dual EC incident S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 115 | 2016 |
Mouse trap: Exploiting firmware updates in {USB} peripherals J Maskiewicz, B Ellis, J Mouradian, H Shacham 8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014 | 57 | 2014 |
Where did i leave my keys? Lessons from the juniper dual ec incident S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ... Communications of the ACM 61 (11), 148-155, 2018 | 9 | 2018 |
The magazine archive includes every article published in Communications of the ACM for over the past 50 years. S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ... Communications of the ACM 61 (11), 148-155, 2018 | | 2018 |
A Systematic Analysis of the Juniper Dual EC Incident JE Maskiewicz UC San Diego, 2016 | | 2016 |