[PDF][PDF] Security and privacy vulnerabilities of {In-Car} wireless networks: A tire pressure monitoring system case study

I Rouf, R Miller, H Mustafa, T Taylor, S Oh… - 19th USENIX Security …, 2010 - usenix.org
Wireless networks are being integrated into the modern automobile. The security and
privacy implications of such in-car networks, however, have are not well understood as their …

Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis

M Gruteser, D Grunwald - Proceedings of the 1st ACM international …, 2003 - dl.acm.org
The recent proliferation of wireless local area networks (WLAN) has introduced new location
privacy risks. An adversary controlling several access points could triangulate a client's …

Vde: Virtual distributed ethernet

R Davoli - First international conference on testbeds and …, 2005 - ieeexplore.ieee.org
The idea of VDE is very effective but straightforward simple and can be applied in very many
configuration to provide several services. It is a sort of Swiss knife of emulated networks. It …

Routing worm: A fast, selective attack worm based on ip address information

CC Zou, D Towsley, W Gong… - Workshop on Principles of …, 2005 - ieeexplore.ieee.org
Most well-known worms, such as Code Red, Slammer, Blaster, and Sasser, infected
vulnerable computers by scanning the entire IPv4 address space. In this paper, we present …

A Blockchain-Based Mutual Authentication Method to Secure the Electric Vehicles' TPMS

P Razmjoui, A Kavousi-Fard, T Jin… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Despite the widespread use of radio frequency identification and wireless connectivity such
as near field communication in electric vehicles, their security and privacy implications in Ad …

Towards a user-level understanding of ipv6 behavior

F Li, D Freeman - Proceedings of the ACM Internet Measurement …, 2020 - dl.acm.org
IP address classification and clustering are important tools for security practitioners in
understanding attacks and employing proactive defenses. Over the past decade, network …

Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU

T Cheneau, A Boudguiga, M Laurent - computers & security, 2010 - Elsevier
Cryptographically Generated Addresses (CGA) are today mainly used with the Secure
Neighbor Discovery Protocol (SEND). Despite CGA generalization, current standards only …

A methodological assessment of location privacy risks in wireless hotspot networks

M Gruteser, D Grunwald - … Conference, Boppard, Germany, March 12-14 …, 2004 - Springer
Mobile computing enables users to compute and communicate almost regardless of their
current location. However, as a side effect this technology considerably increased …

Flaw label: Exploiting IPv6 flow label

J Berger, A Klein, B Pinkas - 2020 IEEE Symposium on Security …, 2020 - ieeexplore.ieee.org
The IPv6 protocol was designed with security in mind. One of the changes that IPv6 has
introduced over IPv4 is a new 20-bit flow label field in its protocol header. We show that …

6gcvae: Gated convolutional variational autoencoder for ipv6 target generation

T Cui, G Gou, G Xiong - Advances in Knowledge Discovery and Data …, 2020 - Springer
IPv6 scanning has always been a challenge for researchers in the field of network
measurement. Due to the considerable IPv6 address space, while recent network speed and …