Augur: Internet-wide detection of connectivity disruptions
Anecdotes, news reports, and policy briefings collectively suggest that Internet censorship
practices are pervasive. The scale and diversity of Internet censorship practices makes it …
practices are pervasive. The scale and diversity of Internet censorship practices makes it …
{Off-Path}{TCP} Exploits: Global Rate Limit Considered Dangerous
In this paper, we report a subtle yet serious side channel vulnerability (CVE-2016-5696)
introduced in a recent TCP specification. The specification is faithfully implemented in Linux …
introduced in a recent TCP specification. The specification is faithfully implemented in Linux …
Blind {In/On-Path} attacks and applications to {VPNs}
Protecting network protocols within an encrypted tunnel, using technologies such as Virtual
Private Networks (VPNs), is increasingly important to millions of users needing solutions to …
Private Networks (VPNs), is increasingly important to millions of users needing solutions to …
{Off-Path}{TCP} Exploit: How Wireless Routers Can Jeopardize Your Secrets
In this study, we discover a subtle yet serious timing side channel that exists in all
generations of half-duplex IEEE 802.11 or Wi-Fi technology. Previous TCP injection attacks …
generations of half-duplex IEEE 802.11 or Wi-Fi technology. Previous TCP injection attacks …
Detection of slow port scanning attacks
Cyber Security can be thought of as a set of techniques used to protect the secrecy, integrity,
and availability of computer data against threats. Scanning attack itself is not a technique; In …
and availability of computer data against threats. Scanning attack itself is not a technique; In …
Detecting TCP/IP connections via IPID hash collisions
G Alexander, AM Espinoza… - Proceedings on Privacy …, 2019 - petsymposium.org
We present a novel attack for detecting the presence of an active TCP connection between a
remote Linux server and an arbitrary client machine. The attack takes advantage of side …
remote Linux server and an arbitrary client machine. The attack takes advantage of side …
Off-path TCP exploits of the challenge ACK global rate limit
In this paper, we report a subtle yet serious side channel vulnerability (CVE-2016-5696)
introduced in a recent transmission control protocol (TCP) specification. The specification is …
introduced in a recent transmission control protocol (TCP) specification. The specification is …
Principled unearthing of tcp side channel vulnerabilities
Recent work has showcased the presence of subtle TCP side channels in modern operating
systems, that can be exploited by off-path adversaries to launch pernicious attacks such as …
systems, that can be exploited by off-path adversaries to launch pernicious attacks such as …
Your router is my prober: Measuring ipv6 networks via icmp rate limiting side channels
Active Internet measurements face challenges when some measurements require many
remote vantage points. In this paper, we propose a novel technique for measuring remote …
remote vantage points. In this paper, we propose a novel technique for measuring remote …
Onis: Inferring tcp/ip-based trust relationships completely off-path
X Zhang, J Knockel, JR Crandall - IEEE INFOCOM 2018-IEEE …, 2018 - ieeexplore.ieee.org
We present ONIS, a new scanning technique that can perform network measurements such
as: inferring TCP/IP-based trust relationships off-path, stealthily port scanning a target …
as: inferring TCP/IP-based trust relationships off-path, stealthily port scanning a target …