메뉴 건너뛰기




Volumn , Issue , 2012, Pages 593-604

Collaborative TCP sequence number inference attack - How to crack sequence number under a second

Author keywords

Network packet counters; TCP hijacking; TCP sequence number

Indexed keywords

JAVASCRIPTS; MALWARES; NETWORK DESIGN; NETWORK PACKETS; SEQUENCE NUMBER; SIDE-CHANNEL; TCP HIJACKING;

EID: 84869397228     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2382196.2382258     Document Type: Conference Paper
Times cited : (71)

References (33)
  • 3
    • 84870637438 scopus 로고    scopus 로고
    • Golomb Ruler. http://en.wikipedia.org/wiki/Golomb-ruler.
    • Ruler, G.1
  • 11
    • 84870649047 scopus 로고    scopus 로고
    • sysctl Mac OS X Manual. https://developer.apple.com/library/mac/ #documentation/Darwin/Reference/Manpages/man3/sysctl.3.html#//apple-ref/doc/man/ 3/sysctl.
    • Sysctl Mac OS X Manual
  • 12
  • 15
    • 84888331381 scopus 로고    scopus 로고
    • PiOS: Detecting privacy leaks in iOS applications
    • M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting Privacy Leaks in iOS Applications. In NDSS, 2011.
    • (2011) NDSS
    • Egele, M.1    Kruegel, C.2    Kirda, E.3    Vigna, G.4
  • 16
    • 79955570859 scopus 로고    scopus 로고
    • TaintDroid: An information-ow tracking system for realtime privacy monitoring on smartphones
    • W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-ow Tracking System for Realtime Privacy Monitoring on Smartphones. In OSDI, 2010.
    • (2010) OSDI
    • Enck, W.1    Gilbert, P.2    Chun, B.-G.3    Cox, L.P.4    Jung, J.5    McDaniel, P.6    Sheth, A.N.7
  • 18
    • 84906789612 scopus 로고    scopus 로고
    • Idle port scanning and non-interference analysis of network protocol stacks using model checking
    • R. Ensafi, J. C. Park, D. Kapur, and J. R. Crandall. Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks using Model Checking. In Proc. of USENIX Security Symposium, 2010.
    • (2010) Proc. of USENIX Security Symposium
    • Ensafi, R.1    Park, J.C.2    Kapur, D.3    Crandall, J.R.4
  • 21
    • 84878716453 scopus 로고    scopus 로고
    • Characterization and measurement of TCP traversal through NATs and firewalls
    • S. Guha and P. Francis. Characterization and Measurement of TCP Traversal through NATs and Firewalls. In Proc. ACM SIGCOMM IMC, 2005.
    • (2005) Proc. ACM SIGCOMM IMC
    • Guha, S.1    Francis, P.2
  • 26
    • 84878347923 scopus 로고    scopus 로고
    • Off-Path TCP sequence number inference attack - How firewall middleboxes reduce security
    • Z. Qian and Z. M. Mao. Off-Path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security. In Proc. of IEEE Security and Privacy, 2012.
    • (2012) Proc. of IEEE Security and Privacy
    • Qian, Z.1    Mao, Z.M.2
  • 27
    • 77955187093 scopus 로고    scopus 로고
    • Investigation of triangular spamming: A stealthy and efficient spamming technique
    • Z. Qian, Z. M. Mao, Y. Xie, and F. Yu. Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique. In Proc. of IEEE Security and Privacy, 2010.
    • (2010) Proc. of IEEE Security and Privacy
    • Qian, Z.1    Mao, Z.M.2    Xie, Y.3    Yu, F.4
  • 30
    • 84882198584 scopus 로고    scopus 로고
    • Compromising electromagnetic emanations of wired and wireless keyboards
    • M. Vuagnoux and S. Pasini. Compromising electromagnetic emanations of wired and wireless keyboards. In Proc. of USENIX Security Symposium, 2009.
    • (2009) Proc. of USENIX Security Symposium
    • Vuagnoux, M.1    Pasini, S.2
  • 31
    • 80053141283 scopus 로고    scopus 로고
    • An untold stody of middleboxes in cellular networks
    • Z. Wang, Z. Qian, Q. Xu, Z. M. Mao, and M. Zhang. An Untold Stody of Middleboxes in Cellular Networks. In SIGCOMM, 2011.
    • (2011) SIGCOMM
    • Wang, Z.1    Qian, Z.2    Xu, Q.3    Mao, Z.M.4    Zhang, M.5
  • 32
    • 58149088319 scopus 로고    scopus 로고
    • Slipping in the window: TCP reset attacks
    • P. A. Watson. Slipping in the Window: TCP Reset Attacks. In CanSecWest, 2004.
    • (2004) CanSecWest
    • Watson, P.A.1
  • 33
    • 79959957319 scopus 로고    scopus 로고
    • Peeping tom in the neighborhood: Keystroke eavesdropping on multi-user systems
    • K. Zhang and X. Wang. Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. In Proc. of USENIX Security Symposium, 2009.
    • (2009) Proc. of USENIX Security Symposium
    • Zhang, K.1    Wang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.