Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2012.07432
Cited By
Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
14 December 2020
Amit Klein
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)"
10 / 10 papers shown
Title
A Taxonomy and Comparative Analysis of IPv4 ID Selection Correctness, Security, and Performance
Joshua J. Daymude
Antonio M. Espinoza
Sean Bergen
Benjamin Mixon-Baca
Jeffrey Knockel
Jedidiah R. Crandall
16
0
0
10 Jun 2024
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing
Qifan Zhang
Xuesong Bai
Xiang Li
Haixin Duan
Qi Li
Zhou Li
27
3
0
04 Oct 2023
Device Tracking via Linux's New TCP Source Port Selection Algorithm (Extended Version)
Moshe Kol
Amit Klein
Y. Gilad
26
2
0
26 Sep 2022
From IP to transport and beyond: cross-layer attacks against applications
Tianxiang Dai
Philipp Jeitner
Haya Shulman
Michael Waidner
AAML
16
18
0
12 May 2022
The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources
Tianxiang Dai
Philipp Jeitner
Haya Shulman
Michael Waidner
30
18
0
11 May 2022
On Random Number Generation for Kernel Applications
Kunal Abhishek
E.George Dharma Prakash Raj
16
2
0
14 Apr 2022
Subverting Stateful Firewalls with Protocol States (Extended Version)
Amit Klein
14
5
0
17 Dec 2021
On The Vulnerability of Anti-Malware Solutions to DNS Attacks
Asaf Nadler
Ron Bitton
Oleg Brodt
A. Shabtai
AAML
25
5
0
23 Sep 2021
The Impact of DNS Insecurity on Time
Philipp Jeitner
Haya Schulmann
Michael Waidner
24
17
0
19 Oct 2020
Fragmentation Considered Poisonous
A. Herzberg
Haya Schulmann
78
26
0
17 May 2012
1