Discover, Analyze, and Validate Attacks with Introspective Side Channels.

作者: Zhiyun Qian

DOI:

关键词:

摘要:

参考文章(57)
Thomas La Porta, Patrick McDaniel, Patrick Traynor, On attack causality in internet-connected cellular networks usenix security symposium. pp. 21- ,(2007)
Kehuan Zhang, XiaoFeng Wang, Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems usenix security symposium. pp. 17- 32 ,(2009)
O. De Mey, L. Schumacher, X. Dubois, Optimum Number of RLC Retransmissions for Best TCP Performance in UTRAN personal, indoor and mobile radio communications. ,vol. 3, pp. 1545- 1549 ,(2005) , 10.1109/PIMRC.2005.1651703
Heikki Kaaranen, Valtteri Niemi, Siamak Naghian, Lauri Laitinen, Ari Ahtiainen, UMTS Networks: Architecture, Mobility and Services ,(2001)
Laurent Joncheray, A Simple active attack against TCP usenix security symposium. pp. 2- 2 ,(1995)
Vern Paxson, Robin Sommer, Nicholas Weaver, Detecting Forged TCP Reset Packets. network and distributed system security symposium. ,(2009)
Patrick Haffner, Dawn Song, Shobha Venkataraman, Oliver Spatscheck, Subhabrata Sen, Exploiting network structure for proactive spam mitigation usenix security symposium. pp. 11- ,(2007)
Roya Ensafi, Deepak Kapur, Jedidiah R. Crandall, Jong Chun Park, Idle port scanning and non-interference analysis of network protocol stacks using model checking usenix security symposium. pp. 17- 17 ,(2010)
Martin Vuagnoux, Sylvain Pasini, Compromising electromagnetic emanations of wired and wireless keyboards usenix security symposium. pp. 1- 16 ,(2009)