Sciweavers

362 search results - page 4 / 73
» Extending the Resynchronization Attack
Sort
View
EUROSEC
2009
ACM
14 years 2 months ago
Application-based TCP hijacking
We present application-based TCP hijacking (ABTH), a new attack on TCP applications that exploits flaws due to the interplay between TCP and application protocols to inject data ...
Oliver Zheng, Jason Poon, Konstantin Beznosov
FC
2007
Springer
111views Cryptology» more  FC 2007»
14 years 1 months ago
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks
Abstract. In this usability study of phishing attacks and browser antiphishing defenses, 27 users each classified 12 web sites as fraudulent or legitimate. By dividing these users...
Collin Jackson, Daniel R. Simon, Desney S. Tan, Ad...
CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
12 years 3 months ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
ICICS
2007
Springer
14 years 1 months ago
Extending FORK-256 Attack to the Full Hash Function
Abstract. In a paper published in FSE 2007, a way of obtaining nearcollisions and in theory also collisions for the FORK-256 hash function was presented [8]. The paper contained ex...
Scott Contini, Krystian Matusiewicz, Josef Pieprzy...
FC
2004
Springer
78views Cryptology» more  FC 2004»
14 years 23 days ago
Timing Attacks in Low-Latency Mix Systems (Extended Abstract)
Brian Neil Levine, Michael K. Reiter, Chenxi Wang,...