A survey on registration hijacking attack consequences and protection for Session Initiation Protocol (SIP)

MM Naeem, I Hussain, MMS Missen - Computer Networks, 2020 - Elsevier
… of the called party, either straight to the called party or to … protocol, while the flicker software
client helps TLS and ZRTP … The processed package has been categorized and saved in …

Gallium: Automated software middlebox offloading to programmable switches

K Zhang, D Zhuo, A Krishnamurthy - … , architectures, and protocols for …, 2020 - dl.acm.org
… , the pre-processing code will pack the current counter value into the packet header and
send it to the middlebox server, where the table update is performed. When applying Gallium to …

A software deep packet inspection system for network traffic analysis and anomaly detection

W Song, M Beshley, K Przystupa, H Beshley, O Kochan… - Sensors, 2020 - mdpi.com
… process of monitoring of events in computer systems and … , the information on what protocol
the given package belongs … of other protocols, such as SIP(Session Initiation Protocol) …

A model for the remote deployment, update, and safe recovery for commercial sensor-based iot systems

A Radovici, I Culic, D Rosner, F Oprea - Sensors, 2020 - mdpi.com
… receiving 133 different remote software updates through our solution. In … that uses the snap
package manager to enable the … of events are login and logout of users, and product updates. …

Towards automated auditing for account and session management flaws in single sign-on deployments

M Ghasemisharif, C Kanich… - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
… evasion techniques, eventually we resorted to using the third-party package puppeteerextra-plugin-stealth
[27], which frequently gets updated with the latest evasion techniques. While …

{FlowDist}:{Multi-Staged}{Refinement-Based} Dynamic Information Flow Analysis for Distributed Software Systems

X Fu, H Cai - 30th USENIX security symposium (USENIX Security 21 …, 2021 - usenix.org
… on a dynamic information flow path between the same pair, we only need to probe for the
events of … The system and load tests were part of the software packages downloaded from the …

Extended data plane architecture for in-network security services in software-defined networks

J Kim, Y Kim, V Yegneswaran, P Porras, S Shin… - Computers & …, 2023 - Elsevier
… We present an implementation of DPX in hardware using NetFPGA-SUME and in software
using Open vSwitch. We evaluate the performance of the DPX prototype and the efficacy of its …

Secure over-the-air software updates in connected vehicles: A survey

S Halder, A Ghosal, M Conti - Computer Networks, 2020 - Elsevier
… the software update procedure into two categories: local update and remote or OTA update.
… Generally, a software update package can range from tens of Megabytes to even Gigabytes […

IoT Device security through dynamic hardware isolation with cloud-Based update

F Hategekimana, TJL Whitaker, MJH Pantho… - Journal of Systems …, 2020 - Elsevier
… from the software level, … using the server’s public RSA key, done with a write to the RSA
core’s input memory index, followed by a read out of the encrypted cipher. Finally, we package

[图书][B] Linux yourself: concept and programming

SK Singh - 2021 - taylorfrancis.com
… more aspects to understand the system programming in the Linux environment Gives a
detailed description of Linux administration by elaborating LILO, GRUB, RPM-based package, …