Benjamin VanderSloot
Benjamin VanderSloot
Graduate Student, University of Michigan
Verified email at umich.edu - Homepage
TitleCited byYear
Imperfect forward secrecy: How Diffie-Hellman fails in practice
D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
4012015
Towards a complete view of the certificate ecosystem
B VanderSloot, J Amann, M Bernhard, Z Durumeric, M Bailey, ...
Proceedings of the 2016 Internet Measurement Conference, 543-549, 2016
502016
DDoSCoin: Cryptocurrency with a malicious proof-of-work
E Wustrow, B VanderSloot
10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16), 2016
112016
403 forbidden: A global view of cdn geoblocking
A McDonald, M Bernhard, L Valenta, B VanderSloot, W Scott, N Sullivan, ...
Proceedings of the Internet Measurement Conference 2018, 218-230, 2018
92018
An ISP-scale deployment of TapDance
S Frolov, F Douglas, W Scott, A McDonald, B VanderSloot, R Hynes, ...
7th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2017
82017
Quack: Scalable remote measurement of application-layer censorship
B VanderSloot, A McDonald, W Scott, JA Halderman, R Ensafi
27th {USENIX} Security Symposium ({USENIX} Security 18), 187-202, 2018
72018
Data processing apparatus with memory rename table for mapping memory addresses to registers
JM Pusdesris, Y Kang, A Pellegrini, BA Vandersloot, TN Mudge
US Patent 9,471,480, 2016
62016
Imperfect Forward Secrecy
D Adrian, L Valenta, B VanderSloot, E Wustrow, S Zanella-Béguelin, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
62015
A security analysis of police computer systems
B VanderSloot, S Wheaton, JA Halderman
2016 14th Annual Conference on Privacy, Security and Trust (PST), 714-721, 2016
32016
Beyond Acceptable Advertisement: Better Understanding Blocking Extensions
B VanderSloot, S Sprecher, JA Halderman
2019
A memory rename table to reduce energy and improve performance
J Pusdesris, B VanderSloot, T Mudge
2014 IEEE/ACM International Symposium on Low Power Electronics and Design …, 2014
2014
The LOGJAM attack
IF Secrecy, D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, ...
The system can't perform the operation now. Try again later.
Articles 1–12