Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite.

Saved in:
Bibliographic Details
Title: Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite.
Authors: Feng, Xuewei1 (AUTHOR) fengxw06@126.com, Li, Qi1 (AUTHOR) qli01@tsinghua.edu.cn, Sun, Kun2 (AUTHOR) ksun3@gmu.edu, Xu, Ke1 (AUTHOR) xuke@tsinghua.edu.cn, Wu, Jianping1 (AUTHOR) jianping@cernet.edu.cn
Source: Communications of the ACM. Mar2025, Vol. 68 Issue 3, p48-59. 12p.
Subject Terms: *TCP/IP, *COMPUTER security vulnerabilities, *COMPUTER network protocols, INTERNET security, ERROR messages (Computer science)
Abstract: The article looks at cyber security, focusing on the TCP/IP Internet protocol. It analyzes various vulnerabilities in TCP/IP use, including some related to the forgery of Internet Control Message Protocol (ICMP) error messages. Possible solutions are discussed.
Database: Business Source Index
Description
Abstract:The article looks at cyber security, focusing on the TCP/IP Internet protocol. It analyzes various vulnerabilities in TCP/IP use, including some related to the forgery of Internet Control Message Protocol (ICMP) error messages. Possible solutions are discussed.
ISSN:00010782
DOI:10.1145/3689819