ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2012.07432
  4. Cited By
Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device
  Tracking and More)

Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)

14 December 2020
Amit Klein
    AAML
ArXivPDFHTML

Papers citing "Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)"

10 / 10 papers shown
Title
A Taxonomy and Comparative Analysis of IPv4 ID Selection Correctness,
  Security, and Performance
A Taxonomy and Comparative Analysis of IPv4 ID Selection Correctness, Security, and Performance
Joshua J. Daymude
Antonio M. Espinoza
Sean Bergen
Benjamin Mixon-Baca
Jeffrey Knockel
Jedidiah R. Crandall
16
0
0
10 Jun 2024
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with
  Query-Response Fuzzing
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing
Qifan Zhang
Xuesong Bai
Xiang Li
Haixin Duan
Qi Li
Zhou Li
27
3
0
04 Oct 2023
Device Tracking via Linux's New TCP Source Port Selection Algorithm
  (Extended Version)
Device Tracking via Linux's New TCP Source Port Selection Algorithm (Extended Version)
Moshe Kol
Amit Klein
Y. Gilad
26
2
0
26 Sep 2022
From IP to transport and beyond: cross-layer attacks against
  applications
From IP to transport and beyond: cross-layer attacks against applications
Tianxiang Dai
Philipp Jeitner
Haya Shulman
Michael Waidner
AAML
16
18
0
12 May 2022
The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet
  Resources
The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources
Tianxiang Dai
Philipp Jeitner
Haya Shulman
Michael Waidner
30
18
0
11 May 2022
On Random Number Generation for Kernel Applications
On Random Number Generation for Kernel Applications
Kunal Abhishek
E.George Dharma Prakash Raj
16
2
0
14 Apr 2022
Subverting Stateful Firewalls with Protocol States (Extended Version)
Subverting Stateful Firewalls with Protocol States (Extended Version)
Amit Klein
14
5
0
17 Dec 2021
On The Vulnerability of Anti-Malware Solutions to DNS Attacks
On The Vulnerability of Anti-Malware Solutions to DNS Attacks
Asaf Nadler
Ron Bitton
Oleg Brodt
A. Shabtai
AAML
25
5
0
23 Sep 2021
The Impact of DNS Insecurity on Time
The Impact of DNS Insecurity on Time
Philipp Jeitner
Haya Schulmann
Michael Waidner
24
17
0
19 Oct 2020
Fragmentation Considered Poisonous
Fragmentation Considered Poisonous
A. Herzberg
Haya Schulmann
78
26
0
17 May 2012
1