-
5
-
-
84878350743
-
-
Retrieved on 03/04/2012
-
Comet (programming). http://en.wikipedia.org/wiki/Comet-(programming), Retrieved on 03/04/2012.
-
Comet (Programming)
-
-
-
9
-
-
85175134262
-
-
Retrieved on 03/04/2012
-
TCP hijacking video demo. http://youtu.be/T65lQtgUJ2Y, Retrieved on 03/04/2012.
-
TCP Hijacking Video Demo
-
-
-
10
-
-
85175132428
-
-
Retrived on 03/04/2012
-
Access Point Name. http://en.wikipedia.org/wiki/Access Point Name, Retrived on 03/04/2012.
-
Access Point Name
-
-
-
11
-
-
84870649449
-
-
Retrived on 03/04/2012
-
MSN Messenger Protocol. http://www.hypothetic.org/docs/msn/, Retrived on 03/04/2012.
-
MSN Messenger Protocol
-
-
-
12
-
-
21644452807
-
A Look Back at "Security Problems in the TCP/IP Protocol Suite"
-
S. M. Bellovin. A Look Back at "Security Problems in the TCP/IP Protocol Suite". In ACSAC, 2004.
-
(2004)
ACSAC
-
-
Bellovin, S.M.1
-
14
-
-
77955197190
-
Side-channel leaks in web applications: A reality today, a challenge tomorrow
-
S. Chen, R. Wang, X. Wang, and K. Zhang. Side-channel leaks in web applications: a reality today, a challenge tomorrow. In Proc. of IEEE Security and Privacy, 2010.
-
Proc. of IEEE Security and Privacy, 2010
-
-
Chen, S.1
Wang, R.2
Wang, X.3
Zhang, K.4
-
15
-
-
85175131574
-
-
8.2 Retrieved on 03/04/2012
-
Cisco. Cisco ASA 5500 Series Configuration Guide using the CLI, 8.2. http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns tcpnorm.html, Retrieved on 03/04/2012.
-
Cisco ASA 5500 Series Configuration Guide Using the CLI
-
-
-
18
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: attacks and defenses. In Proc. of USENIX Security Symposium, 2011.
-
Proc. of USENIX Security Symposium, 2011
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
21
-
-
34548765812
-
-
Juniper Retrieved on 03/04/2012
-
Juniper. Stateful Inspection Firewalls. http://www.abchost.sk/download/ 204-4/juniper-stateful-inspection-firewall.pdf, Retrieved on 03/04/2012.
-
Stateful Inspection Firewalls
-
-
-
22
-
-
0037903656
-
Analysis of Vulnerabilities in Internet Firewalls
-
S. Kamara, S. Fahmy, E. Schultz, F. Kerschbaum, and M. Frantzen. Analysis of Vulnerabilities in Internet Firewalls. In "Computers & Security", 2003.
-
(2003)
Computers & Security
-
-
Kamara, S.1
Fahmy, S.2
Schultz, E.3
Kerschbaum, F.4
Frantzen, M.5
-
23
-
-
84870632676
-
-
Retrieved on 03/04/2012
-
G. LEECH, P. RAYSON, and A. WILSON. Procfs Analysis. http://www.nsa.gov/ research/ files/selinux/papers/slinux/node57.shtml, Retrieved on 03/04/2012.
-
Procfs Analysis
-
-
Leech, G.1
Rayson, P.2
Wilson, A.3
-
24
-
-
85175130200
-
Blind TCP/IP hijacking is still alive
-
lkm
-
lkm. Blind TCP/IP hijacking is still alive. In Phrack Magazine, issue 64, 2007.
-
(2007)
Phrack Magazine
, Issue.64
-
-
-
28
-
-
34247384032
-
-
RFC 5382
-
E. S. Guha, K. Biswas, B. Ford, S. Sivakumar, and P. Srisuresh. NAT Behavioral Requirements for TCP. RFC 5382, 2008.
-
(2008)
NAT Behavioral Requirements for TCP
-
-
Guha, E.S.1
Biswas, K.2
Ford, B.3
Sivakumar, S.4
Srisuresh, P.5
-
29
-
-
79959466110
-
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones
-
R. Schlegel, K. Zhang, X. yong Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In NDSS, 2011.
-
(2011)
NDSS
-
-
Schlegel, R.1
Zhang, K.2
Yong Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
32
-
-
80053141283
-
An Untold Stody of Middleboxes in Cellular Networks
-
Z. Wang, Z. Qian, Q. Xu, Z. M. Mao, and M. Zhang. An Untold Stody of Middleboxes in Cellular Networks. In SIGCOMM, 2011.
-
(2011)
SIGCOMM
-
-
Wang, Z.1
Qian, Z.2
Xu, Q.3
Mao, Z.M.4
Zhang, M.5
-
33
-
-
58149088319
-
Slipping in the Window: TCP Reset Attacks
-
P. A. Watson. Slipping in the Window: TCP Reset Attacks. In CanSecWest, 2004.
-
(2004)
CanSecWest
-
-
Watson, P.A.1
-
34
-
-
84883298692
-
Cellular Data Network Infrastructure Characterization and Implication on Mobile Content Placement
-
Q. Xu, J. Huang, Z. Wang, F. Qian, A. Gerber, and Z. M. Mao. Cellular Data Network Infrastructure Characterization and Implication on Mobile Content Placement. In Proc. ACM SIGMETRICS, 2011.
-
Proc. ACM SIGMETRICS, 2011
-
-
Xu, Q.1
Huang, J.2
Wang, Z.3
Qian, F.4
Gerber, A.5
Mao, Z.M.6
-
35
-
-
79959957319
-
Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems
-
K. Zhang and X. Wang. Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. In Proc. of USENIX Security Symposium, 2009.
-
Proc. of USENIX Security Symposium, 2009
-
-
Zhang, K.1
Wang, X.2
|