Augur: Internet-wide detection of connectivity disruptions

P Pearce, R Ensafi, F Li, N Feamster… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
Anecdotes, news reports, and policy briefings collectively suggest that Internet censorship
practices are pervasive. The scale and diversity of Internet censorship practices makes it …

{Off-Path}{TCP} Exploits: Global Rate Limit Considered Dangerous

Y Cao, Z Qian, Z Wang, T Dao… - 25th USENIX Security …, 2016 - usenix.org
In this paper, we report a subtle yet serious side channel vulnerability (CVE-2016-5696)
introduced in a recent TCP specification. The specification is faithfully implemented in Linux …

Blind {In/On-Path} attacks and applications to {VPNs}

WJ Tolley, B Kujath, MT Khan… - 30th USENIX Security …, 2021 - usenix.org
Protecting network protocols within an encrypted tunnel, using technologies such as Virtual
Private Networks (VPNs), is increasingly important to millions of users needing solutions to …

{Off-Path}{TCP} Exploit: How Wireless Routers Can Jeopardize Your Secrets

W Chen, Z Qian - 27th USENIX Security Symposium (USENIX Security …, 2018 - usenix.org
In this study, we discover a subtle yet serious timing side channel that exists in all
generations of half-duplex IEEE 802.11 or Wi-Fi technology. Previous TCP injection attacks …

Detection of slow port scanning attacks

M u Nisa, K Kifayat - … on Cyber Warfare and Security (ICCWS), 2020 - ieeexplore.ieee.org
Cyber Security can be thought of as a set of techniques used to protect the secrecy, integrity,
and availability of computer data against threats. Scanning attack itself is not a technique; In …

Detecting TCP/IP connections via IPID hash collisions

G Alexander, AM Espinoza… - Proceedings on Privacy …, 2019 - petsymposium.org
We present a novel attack for detecting the presence of an active TCP connection between a
remote Linux server and an arbitrary client machine. The attack takes advantage of side …

Off-path TCP exploits of the challenge ACK global rate limit

Y Cao, Z Qian, Z Wang, T Dao… - IEEE/ACM …, 2018 - ieeexplore.ieee.org
In this paper, we report a subtle yet serious side channel vulnerability (CVE-2016-5696)
introduced in a recent transmission control protocol (TCP) specification. The specification is …

Principled unearthing of tcp side channel vulnerabilities

Y Cao, Z Wang, Z Qian, C Song… - Proceedings of the …, 2019 - dl.acm.org
Recent work has showcased the presence of subtle TCP side channels in modern operating
systems, that can be exploited by off-path adversaries to launch pernicious attacks such as …

Your router is my prober: Measuring ipv6 networks via icmp rate limiting side channels

L Pan, J Yang, L He, Z Wang, L Nie, G Song… - arXiv preprint arXiv …, 2022 - arxiv.org
Active Internet measurements face challenges when some measurements require many
remote vantage points. In this paper, we propose a novel technique for measuring remote …

Onis: Inferring tcp/ip-based trust relationships completely off-path

X Zhang, J Knockel, JR Crandall - IEEE INFOCOM 2018-IEEE …, 2018 - ieeexplore.ieee.org
We present ONIS, a new scanning technique that can perform network measurements such
as: inferring TCP/IP-based trust relationships off-path, stealthily port scanning a target …