Network (In)security: Leniency in Protocols' Design, Code and Configuration
Abstract
References
Index Terms
- Network (In)security: Leniency in Protocols' Design, Code and Configuration
Recommendations
On remote exploitation of TCP sender for low-rate flooding denial-of-service attack
This letter shows a potentially harmful scenario named Induced-shrew attack in which a malicious TCP receiver remotely controls the transmission rate and pattern of a TCP sender to exploit it as a flood source for launching low-rate Denial-of-Service (...
On the security of RFID anti-counting security protocol (ACSP)
Recently Qian et al. (2012) [26] have proposed a new attack for RFID systems, called counting attack, where the attacker just aims to estimate the number of tagged objects instead of steal the tags' private information. They have stated that most of ...
Design guidelines for security protocols to prevent replay & parallel session attacks
This work is concerned with the design of security protocols. These protocols are susceptible to intruder attacks and their security compromised if weaknesses in the protocols' design are evident. In this paper a new analysis is presented on the reasons ...
Comments
Information & Contributors
Information
Published In

- General Chair:
- Sven Dietrich,
- Program Chairs:
- Omar Chowdhury,
- Daniel Takabi
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Keynote
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 123Total Downloads
- Downloads (Last 12 months)64
- Downloads (Last 6 weeks)13
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in