Zobrazeno 1 - 10
of 176
pro vyhledávání: '"Feng Xuewei"'
After more than 40 years of development, the fundamental TCP/IP protocol suite, serving as the backbone of the Internet, is widely recognized for having achieved an elevated level of robustness and security. Distinctively, we take a new perspective t
Externí odkaz:
http://arxiv.org/abs/2411.09895
Autor:
Feng, Xuewei, Yang, Yuxiang, Li, Qi, Zhan, Xingxiang, Sun, Kun, Wang, Ziqiang, Wang, Ao, Du, Ganqiu, Xu, Ke
In this paper, we conduct an empirical study on remote DoS attacks targeting NAT networks. We show that Internet attackers operating outside local NAT networks can remotely identify a NAT device and subsequently terminate TCP connections initiated fr
Externí odkaz:
http://arxiv.org/abs/2410.21984
Publikováno v:
Nanophotonics, Vol 9, Iss 7, Pp 1579-1599 (2020)
Photonic computing and neuromorphic computing are attracting tremendous interests in breaking the memory wall of traditional von Neumann architecture. Photonic memristors equipped with light sensing, data storage, and information processing capabilit
Externí odkaz:
https://doaj.org/article/e90a2e97474c4a8ebaa58d1ebea085b4
Bluetooth Low Energy (BLE) is a short-range wireless communication technology for resource-constrained IoT devices. Unfortunately, BLE is vulnerable to session-based attacks, where previous packets construct exploitable conditions for subsequent pack
Externí odkaz:
http://arxiv.org/abs/2405.17987
In this paper, we uncover a new side-channel vulnerability in the widely used NAT port preservation strategy and an insufficient reverse path validation strategy of Wi-Fi routers, which allows an off-path attacker to infer if there is one victim clie
Externí odkaz:
http://arxiv.org/abs/2404.04601
Autor:
Wang, Ziqiang, Feng, Xuewei, Li, Qi, Sun, Kun, Yang, Yuxiang, Li, Mengyuan, Du, Ganqiu, Xu, Ke, Wu, Jianping
In this paper, we unveil a fundamental side channel in Wi-Fi networks, specifically the observable frame size, which can be exploited by attackers to conduct TCP hijacking attacks. Despite the various security mechanisms (e.g., WEP and WPA2/WPA3) imp
Externí odkaz:
http://arxiv.org/abs/2402.12716
Publikováno v:
IEEE Transactions on Information Forensics and Security, vol. 18, pp. 4561-4576, 2023
Deep learning (DL) methods have been widely applied to anomaly-based network intrusion detection system (NIDS) to detect malicious traffic. To expand the usage scenarios of DL-based methods, federated learning (FL) allows multiple users to train a gl
Externí odkaz:
http://arxiv.org/abs/2210.04052
Publikováno v:
2020 ACM SIGSAC Conference on Computer and Communications Security (CCS'20)
In this paper, we uncover a new off-path TCP hijacking attack that can be used to terminate victim TCP connections or inject forged data into victim TCP connections by manipulating the new mixed IPID assignment method, which is widely used in Linux k
Externí odkaz:
http://arxiv.org/abs/2008.12981
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.