David Adrian
TitleCited byYear
The Matter of Heartbleed
Z Durumeric, J Kasten, D Adrian, JA Halderman, M Bailey, F Li, N Weaver, ...
Proceedings of the 2014 Conference on Internet Measurement Conference, 475-488, 2014
5342014
Imperfect forward secrecy: How Diffie-Hellman fails in practice
D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
4022015
A search engine backed by Internet-wide scanning
Z Durumeric, D Adrian, A Mirian, M Bailey, JA Halderman
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2422015
{DROWN}: Breaking {TLS} Using SSLv2
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 689-706, 2016
1402016
Neither snow nor rain nor MITM... an empirical analysis of email delivery security
Z Durumeric, D Adrian, A Mirian, J Kasten, E Bursztein, N Lidzborski, ...
Proceedings of the 2015 Internet Measurement Conference, 27-39, 2015
762015
Zippier ZMap: Internet-Wide Scanning at 10 Gbps
D Adrian, Z Durumeric, G Singh, JA Halderman
Proceedings of the 8th USENIX conference on Offensive Technologies, 8-8, 2014
472014
An internet-wide view of ics devices
A Mirian, Z Ma, D Adrian, M Tischer, T Chuenchujit, T Yardley, R Berthier, ...
2016 14th Annual Conference on Privacy, Security and Trust (PST), 96-103, 2016
352016
Tracking certificate misissuance in the wild
D Kumar, Z Wang, M Hyder, J Dickinson, G Beck, D Adrian, J Mason, ...
2018 IEEE Symposium on Security and Privacy (SP), 785-798, 2018
292018
Measuring small subgroup attacks against Diffie-Hellman.
L Valenta, D Adrian, A Sanso, S Cohney, J Fried, M Hastings, ...
NDSS, 2017
212017
Performance and energy consumption analysis of a delay-tolerant network for censorship-resistant communication
Y Liu, DR Bild, D Adrian, G Singh, RP Dick, DS Wallach, ZM Mao
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc …, 2015
172015
Drown: Breaking TLS using SSLv2, 2016
N Aviram, S Schinzel, J Somorovsky, N Heninger, M Dankel, J Steube, ...
25th Usenix Security Symposium, 18, 2016
72016
Imperfect Forward Secrecy
D Adrian, L Valenta, B VanderSloot, E Wustrow, S Zanella-Béguelin, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
62015
Using Large-Scale Empirical Methods to Understand Fragile Cryptographic Ecosystems
D Adrian
2018
Zippier ZMap
D Adrian, Z Durumeric, G Singh, JA Halderman
The LOGJAM attack
IF Secrecy, D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, ...
A Search Engine Backed by Internet-Wide Scanning
D Adrian
The system can't perform the operation now. Try again later.
Articles 1–16