Sciweavers

104 search results - page 9 / 21
» Protocol Interactions and the Chosen Protocol Attack
Sort
View
NDSS
2006
IEEE
14 years 22 days ago
Protocol-Independent Adaptive Replay of Application Dialog
For many applications—including recognizing malware variants, determining the range of system versions vulnerable to a given attack, testing defense mechanisms, and filtering m...
Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H...
PAM
2010
Springer
14 years 1 months ago
Web Timeouts and Their Implications
Abstract. Timeouts play a fundamental role in network protocols, controlling numerous aspects of host behavior at different layers of the protocol stack. Previous work has documen...
Zakaria Al-Qudah, Michael Rabinovich, Mark Allman
JSAC
2006
106views more  JSAC 2006»
13 years 6 months ago
Study of BGP Peering Session Attacks and Their Impacts on Routing Performance
We present a detailed study of the potential impact of BGP peering session attacks and the resulting exploitation of Route Flap Damping (RFD) that cause network-wide routing disrup...
Kotikalapudi Sriram, Doug Montgomery, Oliver Borch...
SAC
2009
ACM
14 years 1 months ago
Improving stream correlation attacks on anonymous networks
The level of anonymity offered by low latency, interactive, anonymous networks is unknown. This paper implements correlation attacks on the deployed Tor network and a simulated T...
Gavin O'Gorman, Stephen Blott
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
14 years 25 days ago
Universally Composable Security with Global Setup
Abstract. Cryptographic protocols are often designed and analyzed under some trusted set-up assumptions, namely in settings where the participants have access to global information...
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi W...