Access Control Vulnerabilities in Network Protocol Implementations: How Attackers Exploit Them and What To Do About It
Abstract
References
Index Terms
- Access Control Vulnerabilities in Network Protocol Implementations: How Attackers Exploit Them and What To Do About It
Recommendations
Network randomization protocol: a proactive pseudo-random generator
SSYM'95: Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5A major security threat to any security solutions based on a centralized server is the possibility of an adversary gaining access to and taking control of the server. The adversary may then learn secrets, corrupt data, or send erroneous messages. In ...
Analysis of the DoIP Protocol for Security Vulnerabilities
CSCS '22: Proceedings of the 6th ACM Computer Science in Cars SymposiumDoIP, which is defined in ISO 13400, is a transport protocol stack for diagnostic data. Diagnostic data is a potential attack vector at vehicles, so secure transmission must be guaranteed to protect sensitive data and the vehicle. Previous work ...
Internet of Things: information security challenges and solutions
Keeping up with the burgeoning Internet of Things (IoT) requires staying up to date on the latest network attack trends in dynamic and complicated cyberspace, and take them into account while developing holistic information security (IS) approaches for ...
Comments
Information & Contributors
Information
Published In
- General Chair:
- Silvio Ranise,
- Program Chairs:
- Roberto Carbone,
- Daniel Takabi
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Keynote
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 134Total Downloads
- Downloads (Last 12 months)45
- Downloads (Last 6 weeks)3
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in