메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Off-path attacking the web

Author keywords

[No Author keywords available]

Indexed keywords

TRANSMISSION CONTROL PROTOCOL;

EID: 85084164109     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (31)

References (36)
  • 1
    • 84878615190 scopus 로고    scopus 로고
    • Advanced Network Architecture Group. ANA Spoofer Project. http://spoofer.csail.mit.edu/summary.php, 2012.
    • (2012) ANA Spoofer Project
  • 2
    • 84876672330 scopus 로고    scopus 로고
    • Alexa Web Information Company. Top Sites. http://www.alexa.com/topsites, 2012.
    • (2012) Top Sites
  • 5
    • 70349266257 scopus 로고    scopus 로고
    • Robust defenses for cross-site request forgery
    • Peng Ning, Paul F. Syverson, and Somesh Jha, editors, ACM
    • Adam Barth, Collin Jackson, and John C. Mitchell. Robust Defenses for Cross-Site Request Forgery. In Peng Ning, Paul F. Syverson, and Somesh Jha, editors, ACM Conference on Computer and Communications Security, pages 75–88. ACM, 2008.
    • (2008) ACM Conference on Computer and Communications Security , pp. 75-88
    • Barth, A.1    Jackson, C.2    Mitchell, J.C.3
  • 6
    • 0002738343 scopus 로고
    • Security problems in the TCP/IP protocol suite
    • apr
    • S. M. Bellovin. Security Problems in the TCP/IP Protocol Suite. Computer Communication Review, 19(2):32–48, apr 1989.
    • (1989) Computer Communication Review , vol.19 , Issue.2 , pp. 32-48
    • Bellovin, S.M.1
  • 7
    • 0141762463 scopus 로고    scopus 로고
    • A technique for counting natted hosts
    • ACM
    • Steven M. Bellovin. A Technique for Counting Natted Hosts. In Internet Measurement Workshop, pages 267–272. ACM, 2002.
    • (2002) Internet Measurement Workshop , pp. 267-272
    • Bellovin, S.M.1
  • 8
    • 21644452807 scopus 로고    scopus 로고
    • A look back at”security problems in the TCP/IP protocol suite
    • IEEE Computer Society
    • Steven M. Bellovin. A Look Back at”Security Problems in the TCP/IP Protocol Suite”. In ACSAC, pages 229–249. IEEE Computer Society, 2004.
    • (2004) ACSAC , pp. 229-249
    • Bellovin, S.M.1
  • 10
    • 61849089615 scopus 로고    scopus 로고
    • TCP SYN flooding attacks and common mitigations
    • August
    • W. Eddy. TCP SYN Flooding Attacks and Common Mitigations. RFC 4987 (Informational), August 2007.
    • (2007) RFC 4987 (Informational)
    • Eddy, W.1
  • 16
    • 35348860223 scopus 로고    scopus 로고
    • Defeating script injection attacks with browser-enforced embedded policies
    • Carey L. Williamson, Mary Ellen Zurko, Peter F. Patel-Schneider, and Prashant J. Shenoy, editors, ACM
    • Trevor Jim, Nikhil Swamy, and Michael Hicks. Defeating Script Injection Attacks with Browser-Enforced Embedded Policies. In Carey L. Williamson, Mary Ellen Zurko, Peter F. Patel-Schneider, and Prashant J. Shenoy, editors, Proceedings of the 16th International Conference on World Wide Web, pages 601–610. ACM, 2007.
    • (2007) Proceedings of the 16th International Conference on World Wide Web , pp. 601-610
    • Jim, T.1    Swamy, N.2    Hicks, M.3
  • 17
    • 33746084746 scopus 로고    scopus 로고
    • Security architecture for the internet protocol
    • December
    • S. Kent and K. Seo. Security Architecture for the Internet Protocol. RFC 4301 (Proposed Standard), December 2005.
    • (2005) RFC 4301 (Proposed Standard)
    • Kent, S.1    Seo, K.2
  • 18
    • 25844457130 scopus 로고    scopus 로고
    • Recommended internet service provider security services and procedures
    • November
    • T. Killalea. Recommended Internet Service Provider Security Services and Procedures. RFC 3013 (Best Current Practice), November 2000.
    • (2000) RFC 3013 (Best Current Practice)
    • Killalea, T.1
  • 20
    • 84893120390 scopus 로고    scopus 로고
    • klm
    • klm. Remote Blind TCP/IP Spoofing. Phrack magazine, http://www.phrack.org/issues.html?id=15&issue=64, 2007.
    • (2007) Remote Blind TCP/IP Spoofing
  • 21
    • 80053026930 scopus 로고    scopus 로고
    • Timing is everything: The importance of history detection
    • Vijay Atluri and Claudia Díaz, editors, Springer
    • Gunnar Kreitz. Timing Is Everything: The Importance of History Detection. In Vijay Atluri and Claudia Díaz, editors, ESORICS, volume 6879 of Lecture Notes in Computer Science, pages 117–132. Springer, 2011.
    • (2011) ESORICS, Volume 6879 of Lecture Notes in Computer Science , pp. 117-132
    • Kreitz, G.1
  • 22
    • 77955317816 scopus 로고    scopus 로고
    • New tricks for defeating SSL in practice
    • February
    • M. Marlinspike. New Tricks for Defeating SSL in Practice. In BlackHat DC, February 2009.
    • (2009) BlackHat DC
    • Marlinspike, M.1
  • 27
    • 77954584716 scopus 로고    scopus 로고
    • Reining in the web with content security policy
    • Michael Rappa, Paul Jones, Juliana Freire, and Soumen Chakrabarti, editors, ACM
    • Sid Stamm, Brandon Sterne, and Gervase Markham. Reining in the Web with Content Security Policy. In Michael Rappa, Paul Jones, Juliana Freire, and Soumen Chakrabarti, editors, Proceedings of the 19th International Conference on World Wide Web, pages 921–930. ACM, 2010.
    • (2010) Proceedings of the 19th International Conference on World Wide Web , pp. 921-930
    • Stamm, S.1    Sterne, B.2    Markham, G.3
  • 28
    • 79952547383 scopus 로고    scopus 로고
    • The Open Web Application Security Project. Cross-Site Request Forgery. https://www.owasp.org/index.php/ Cross-Site_Request_Forgery_(CSRF), 2010.
    • (2010) Cross-Site Request Forgery
  • 31
    • 80051955689 scopus 로고    scopus 로고
    • I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks
    • IEEE Computer Society
    • Zachary Weinberg, Eric Yawei Chen, Pavithra Ramesh Jayaraman, and Collin Jackson. I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks. In IEEE Symposium on Security and Privacy, pages 147–161. IEEE Computer Society, 2011.
    • (2011) IEEE Symposium on Security and Privacy , pp. 147-161
    • Weinberg, Z.1    Chen, E.Y.2    Jayaraman, P.R.3    Jackson, C.4
  • 32
    • 84864230668 scopus 로고    scopus 로고
    • December
    • Wikipedia. Usage Share of Operating Systems. http://en.wikipedia.org/wiki/Usage_ share_of_operating_systems, December 2011.
    • (2011) Usage Share of Operating Systems


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.