Entry Gilad:2013:FCV from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Gilad:2013:FCV,
author = "Yossi Gilad and Amir Herzberg",
title = "Fragmentation Considered Vulnerable",
journal = j-TISSEC,
volume = "15",
number = "4",
pages = "16:1--16:??",
month = apr,
year = "2013",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2445566.2445568",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Apr 4 18:18:20 MDT 2013",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "We show that fragmented IPv4 and IPv6 traffic is
vulnerable to effective interception and
denial-of-service (DoS) attacks by an off-path
attacker. Specifically, we demonstrate a weak attacker
intercepting more than 80\% of the data between peers
and causing over 94\% loss rate. We show that our
attacks are practical through experimental validation
on popular industrial and open-source products, with
realistic network setups that involve NAT or tunneling
and include concurrent legitimate traffic as well as
packet losses. The interception attack requires a
zombie agent behind the same NAT or tunnel-gateway as
the victim destination; the DoS attack only requires a
puppet agent, that is, a sandboxed applet or script
running in web-browser context. The complexity of our
attacks depends on the predictability of the IP
Identification (ID) field which is typically
implemented as one or multiple counters, as allowed and
recommended by the IP specifications. The attacks are
much simpler and more efficient for implementations,
such as Windows, which use one ID counter for all
destinations. Therefore, much of our focus is on
presenting effective attacks for implementations, such
as Linux, which use per-destination ID counters. We
present practical defenses for the attacks presented in
this article, the defenses can be deployed on network
firewalls without changes to hosts or operating system
kernel.",
acknowledgement = ack-nhfb,
articleno = "16",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- agent,
12(1)1,
12(1)5
- all,
1(1)93,
2(2)159,
2(3)332,
2(4)416,
10(1)4,
10(2)5,
10(4)2,
10(4)4,
11(2)1,
11(2)3,
11(2)4,
11(2)5,
11(2)6,
11(3)13,
11(4)18,
11(4)20,
11(4)22,
12(2)10,
12(3)18,
13(1)10,
13(3)25,
13(3)28,
13(4)38,
13(4)41,
14(1)6,
14(1)14,
14(3)27,
15(1)4,
15(2)9,
15(3)14,
15(4)17,
16(1)4,
17(1)2,
17(3)9,
17(3)11,
18(1)2,
18(2)5
- allowed,
1(1)26,
10(4)2,
11(2)3,
12(2)10,
13(4)40
- article,
10(1)3,
11(1)3,
11(1)4,
11(2)5,
11(3)12,
11(3)14,
11(3)15,
11(3)16,
11(4)20,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)4,
12(1)6,
12(2)8,
12(2)10,
12(2)13,
12(3)14,
12(3)16,
12(3)17,
12(3)19,
12(4)21,
12(4)22,
13(3)22,
13(3)24,
13(3)25,
13(3)27,
13(3)28,
13(4)29,
13(4)31,
13(4)32,
13(4)34,
13(4)36,
13(4)41,
14(1)2,
14(1)3,
14(1)4,
14(1)10,
14(1)13,
14(1)14,
14(3)23,
14(3)25,
14(4)30,
15(2)9,
15(2)10,
15(3)11,
15(3)12,
15(3)13,
15(4)15,
15(4)17,
16(1)1,
16(1)4,
16(2)6,
16(2)7,
16(2)8,
16(3)10,
16(4)14,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
17(3)12,
17(4)13,
17(4)16,
18(1)3,
18(2)5,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- attacker,
2(2)159,
8(1)78,
10(1)4,
10(4)3,
10(4)6,
11(3)12,
11(3)15,
12(1)4,
12(2)12,
12(3)17,
12(4)22,
13(4)37,
14(1)7,
14(1)13,
14(4)31,
15(1)2,
17(2)8,
17(3)11,
17(4)13,
17(4)16,
18(1)1,
18(2)7,
18(4)13
- behind,
16(1)1,
18(1)1
- causing,
18(2)5
- change,
2(3)332,
12(3)14,
13(4)30,
13(4)34,
14(1)2,
15(3)13,
15(4)17,
16(4)17,
17(4)15,
18(3)9
- complexity,
2(1)65,
9(4)391,
9(4)421,
10(2)5,
10(4)5,
11(2)6,
12(3)16,
12(3)18,
12(4)20,
13(4)36,
13(4)40,
14(1)3,
14(1)14,
16(1)3,
16(1)4,
16(3)10,
17(4)16,
18(2)6,
18(3)10,
18(4)13
- considered,
1(1)26,
10(2)5,
14(1)14,
15(1)5
- context,
7(3)392,
10(1)2,
10(2)8,
10(3)12,
10(4)2,
11(3)13,
11(3)16,
12(3)18,
12(4)20,
14(1)2,
14(1)4,
15(1)2,
15(2)8,
17(2)7,
17(3)12,
18(3)10
- counter,
10(4)1,
11(4)23,
14(3)26,
18(2)7
- defense,
2(3)230,
11(2)3,
12(2)11,
14(1)7,
14(3)24,
14(3)27,
14(4)31,
15(2)6,
16(4)13,
17(2)8,
17(3)11
- demonstrate,
2(3)295,
10(1)4,
10(4)1,
10(4)4,
10(4)6,
11(1)3,
11(3)16,
11(4)22,
12(1)4,
12(3)19,
13(1)10,
13(4)30,
13(4)31,
13(4)38,
14(3)27,
15(1)2,
15(1)4,
15(2)7,
15(3)12,
15(3)13,
16(3)9,
16(3)10,
17(2)8,
17(3)10,
17(3)12,
17(4)16,
18(2)8,
18(4)12,
18(4)14
- denial-of-service,
10(3)9,
15(3)11,
17(1)4
- depend,
1(1)26,
14(1)8,
15(4)15
- deployed,
10(3)11,
11(3)14,
13(3)26,
14(3)23,
15(1)2,
15(2)6,
15(3)13,
17(3)9,
18(1)1
- destination,
15(2)6,
15(3)14
- DoS,
15(2)6
- effective,
2(3)269,
9(2)113,
9(4)391,
10(1)4,
11(3)12,
11(4)22,
12(2)10,
12(2)13,
12(4)22,
15(3)12,
17(1)3,
17(4)13,
18(1)1,
18(4)12
- efficient,
1(1)26,
3(2)63,
6(2)258,
6(3)365,
7(1)21,
9(4)391,
9(4)461,
10(1)3,
10(2)5,
10(2)6,
10(4)2,
11(1)3,
11(2)4,
11(2)6,
11(3)15,
11(4)19,
12(1)1,
12(3)15,
12(3)18,
12(4)21,
13(1)9,
13(1)10,
13(3)24,
13(3)27,
13(4)31,
13(4)32,
13(4)34,
13(4)38,
14(1)5,
14(1)14,
15(1)4,
15(2)6,
15(2)9,
16(1)2,
16(1)4,
17(3)10,
17(4)15,
18(3)11
- experimental,
1(1)3,
1(1)26,
10(1)3,
10(1)4,
11(1)3,
11(4)22,
11(4)23,
12(1)4,
12(3)16,
13(3)22,
15(3)12,
16(2)7,
16(3)10,
16(4)17,
18(3)11,
18(4)12
- field,
11(2)1,
11(4)22,
15(3)12,
16(3)10,
18(3)11
- firewall,
1(1)66,
2(3)230,
2(3)269
- focus,
10(4)2,
11(2)6,
11(3)12,
11(4)19,
12(1)3,
12(2)12,
14(3)23,
16(3)10,
18(4)13
- fragmentation,
13(3)22
- Gilad, Yossi,
15(2)6,
16(4)13
- Herzberg, Amir,
15(2)6,
16(4)13
- host,
2(2)177,
11(2)2,
11(3)16,
12(2)12,
12(3)14,
13(4)38,
15(2)6,
15(4)17
- ID,
14(4)29
- identification,
11(3)15,
12(4)21,
15(2)7,
16(1)2,
17(3)12
- implementation,
1(1)3,
1(1)26,
1(1)66,
2(1)34,
2(2)177,
2(4)390,
2(4)416,
7(2)319,
11(1)2,
11(1)3,
11(1)4,
11(3)16,
11(4)18,
11(4)22,
12(1)1,
12(2)10,
12(2)11,
12(3)14,
12(4)22,
13(1)4,
13(3)26,
13(3)27,
14(1)3,
15(1)3,
15(2)8,
15(3)13,
16(1)1,
16(1)2,
16(3)9,
16(3)10,
16(3)11,
16(4)13,
17(2)5,
17(2)8,
18(1)2,
18(1)3,
18(1)4
- implemented,
2(3)269,
10(1)4,
11(2)5,
12(1)1,
13(3)26,
14(1)8,
14(3)27,
15(4)18,
17(2)5,
17(3)10,
17(3)11,
17(4)13,
18(2)6
- include,
2(2)138,
2(2)177,
2(4)354,
11(1)3,
11(4)23,
12(3)19,
13(3)24,
13(4)34,
17(4)16,
18(1)3,
18(1)4
- involve,
12(4)21,
16(1)3
- IP,
5(2)119,
10(3)9,
10(3)11,
12(4)22,
13(4)35,
15(2)6,
16(4)14
- kernel,
12(3)14,
13(1)10,
16(2)6,
16(2)7
- legitimate,
11(2)5,
12(4)22,
14(1)2,
16(4)13,
16(4)16
- Linux,
7(2)175,
12(2)10,
16(2)7
- loss,
2(3)295,
14(1)5
- more,
2(1)3,
2(1)65,
2(3)332,
9(2)181,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(3)9,
10(4)1,
10(4)4,
10(4)6,
11(2)3,
11(2)4,
11(2)6,
11(3)14,
11(4)21,
12(1)1,
12(2)8,
12(2)10,
12(2)12,
12(2)13,
12(3)18,
13(1)10,
13(3)20,
13(3)21,
13(3)22,
13(3)28,
13(4)32,
13(4)34,
13(4)39,
14(3)27,
14(4)31,
15(1)2,
15(1)5,
15(2)8,
15(2)9,
15(3)11,
15(3)12,
16(1)2,
16(2)8,
16(3)10,
16(3)11,
16(4)17,
17(1)2,
17(1)3,
17(3)9,
17(4)14,
17(4)16,
18(1)1,
18(3)11,
18(4)13
- much,
2(3)332,
12(2)10,
13(2)13,
13(3)28,
15(1)5,
15(3)14,
18(3)11
- multiple,
2(2)138,
2(2)177,
2(4)390,
11(1)4,
11(4)18,
11(4)22,
11(4)23,
12(1)3,
13(4)32,
13(4)36,
14(1)4,
14(1)6,
14(3)25,
14(4)31,
15(1)2,
15(3)13,
15(4)17,
18(4)13
- of-service, denial-,
10(3)9,
15(3)11,
17(1)4
- off-path,
16(4)13
- one,
1(1)26,
1(1)93,
2(1)3,
2(1)65,
2(3)295,
9(4)461,
10(1)2,
10(2)5,
10(2)8,
10(3)12,
10(4)3,
11(2)6,
11(3)14,
12(1)1,
12(1)5,
12(2)13,
12(3)14,
13(3)21,
13(3)25,
13(3)26,
13(3)27,
13(4)41,
14(1)3,
14(1)5,
14(4)30,
14(4)32,
15(2)10,
15(3)11,
15(4)18,
16(1)3,
16(1)4,
16(3)9,
16(4)14,
17(2)8,
17(4)13,
18(1)1,
18(3)11,
18(4)13
- only,
2(3)230,
2(3)295,
10(4)3,
11(1)3,
11(2)4,
11(3)13,
11(4)20,
12(1)2,
12(1)3,
12(2)13,
12(3)19,
12(4)21,
13(1)10,
13(3)25,
13(3)28,
13(4)35,
13(4)37,
13(4)39,
14(1)5,
14(1)11,
14(3)26,
14(4)31,
15(2)9,
15(4)18,
16(1)3,
16(2)6,
16(2)7,
16(3)9,
16(3)10,
16(4)13,
17(3)9,
17(4)15,
18(2)5,
18(2)8
- operating,
2(2)138,
2(2)177,
2(3)295,
2(4)354,
4(1)72,
5(1)36,
11(4)20,
12(3)14,
13(1)10,
13(4)30,
14(1)6,
14(1)8,
14(3)24,
17(4)14,
18(2)5,
18(3)11
- packet,
2(3)269,
7(2)319,
11(2)2,
11(3)15,
12(2)10,
12(2)11,
12(2)13,
12(4)22,
13(4)35,
14(1)5,
14(1)7,
15(2)6
- path, off-,
16(4)13
- peer,
11(1)4,
15(2)6
- popular,
10(4)5,
14(3)27,
15(2)8,
15(2)10,
15(3)11,
16(4)13,
17(3)11,
17(4)15,
18(1)1
- practical,
2(4)390,
4(2)158,
7(2)319,
9(3)325,
10(2)6,
10(4)1,
11(2)1,
11(2)5,
11(4)18,
12(3)19,
14(1)7,
14(1)14,
14(2)20,
14(4)29,
15(1)4,
15(2)6,
15(2)7,
16(3)10,
16(3)12,
16(4)13,
17(4)16,
18(1)3,
18(4)13
- present,
1(1)26,
2(1)3,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(3)295,
2(4)354,
7(2)319,
9(2)181,
9(4)461,
10(1)2,
10(2)7,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
10(4)3,
11(1)2,
11(1)4,
11(2)2,
11(2)5,
11(3)14,
11(4)22,
12(1)2,
12(1)4,
12(2)10,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(3)17,
12(4)22,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(3)28,
13(4)29,
13(4)41,
14(1)4,
14(1)5,
14(1)6,
15(1)2,
15(2)6,
15(2)8,
15(2)10,
15(3)12,
15(3)13,
15(4)18,
16(2)6,
16(2)7,
16(4)13,
16(4)14,
17(1)4,
17(2)6,
17(2)7,
17(2)8,
17(3)9,
17(3)12,
17(4)14,
17(4)15,
17(4)16,
18(1)3,
18(1)4,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- presented,
1(1)3,
9(2)162,
10(2)7,
10(4)2,
12(2)8,
13(3)25,
15(3)14,
18(4)12
- presenting,
10(1)3,
13(3)28,
14(1)13
- product,
13(4)36,
15(2)7,
17(3)11
- rate,
1(1)3,
10(4)1,
11(3)15,
11(4)20,
12(4)22,
13(4)35,
14(1)5,
15(2)7,
16(2)8,
18(4)14
- realistic,
15(1)4,
15(4)18,
17(4)16
- require,
2(3)269,
10(1)2,
11(1)3,
11(2)2,
11(4)22,
12(1)3,
12(1)6,
12(3)16,
12(4)20,
13(3)20,
13(3)21,
13(4)29,
13(4)33,
13(4)35,
13(4)40,
14(1)2,
14(3)27,
15(2)6,
16(4)13,
17(2)5,
17(3)9,
17(3)10,
17(4)16,
18(1)2,
18(4)13
- running,
10(4)4,
11(4)20,
12(2)10,
12(3)14,
13(1)10,
15(2)6,
16(2)5,
16(4)13
- same,
2(2)177,
2(3)269,
2(4)390,
10(1)3,
10(1)4,
11(2)3,
12(2)10,
12(3)18,
12(4)21,
13(1)10,
13(3)25,
13(4)31,
15(1)3,
15(2)7,
15(2)10,
17(3)10,
17(4)15,
18(1)1
- script,
16(4)13
- service, denial-of-,
10(3)9,
15(3)11,
17(1)4
- setup,
12(4)21,
15(2)7,
16(3)10
- simpler,
9(2)181
- specifically,
9(2)181,
10(3)12,
11(1)4,
11(3)16,
12(1)6,
12(2)12,
12(3)16,
15(2)6,
15(2)8,
16(4)17,
17(4)13,
18(2)5,
18(2)6,
18(3)9
- specification,
1(1)26,
2(1)65,
2(2)177,
3(4)207,
6(4)501,
8(2)187,
8(4)351,
10(2)7,
10(2)8,
10(3)9,
10(4)2,
11(1)4,
11(4)19,
13(3)24,
13(3)26,
14(3)24,
15(3)13,
16(1)3,
16(1)4,
16(4)13,
17(2)5,
17(4)16,
18(2)7,
18(2)8
- than,
2(1)3,
2(1)65,
2(3)332,
9(4)391,
9(4)461,
10(1)4,
11(2)3,
11(2)6,
11(3)14,
12(1)1,
12(2)10,
12(3)16,
12(4)22,
13(1)10,
13(3)21,
13(4)29,
13(4)31,
13(4)35,
14(3)27,
14(4)31,
15(1)5,
15(2)9,
15(2)10,
15(4)15,
16(2)8,
16(4)17,
17(1)2,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
17(4)16,
18(4)13
- therefore,
2(2)177,
10(4)4,
11(4)19,
12(2)11,
13(1)10,
13(3)28,
14(3)24,
15(1)5,
17(1)3
- through,
5(4)367,
6(1)1,
9(2)162,
10(3)12,
10(4)2,
10(4)6,
11(2)2,
11(3)12,
11(4)22,
11(4)23,
12(2)8,
12(2)13,
13(2)12,
13(3)25,
14(1)13,
15(3)12,
16(2)5,
16(2)7,
16(3)9,
17(4)14,
18(1)2,
18(2)7,
18(3)11
- traffic,
2(3)269,
10(2)8,
11(2)2,
11(2)3,
11(3)14,
12(2)13,
12(4)22,
15(2)6,
17(1)4
- tunneling,
15(2)6
- typically,
2(1)65,
10(4)5,
12(3)14,
16(2)8
- use,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(3)269,
2(3)332,
2(4)354,
2(4)390,
4(2)103,
7(1)21,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(2)5,
10(3)11,
10(4)1,
10(4)3,
10(4)5,
10(4)6,
11(1)2,
11(1)3,
11(1)4,
11(2)1,
11(2)4,
11(3)13,
11(3)14,
11(4)18,
11(4)19,
11(4)21,
11(4)22,
12(2)10,
12(3)16,
12(3)18,
13(3)22,
13(3)24,
13(3)25,
13(4)29,
13(4)31,
13(4)36,
14(1)6,
14(1)8,
14(1)10,
14(1)11,
14(4)31,
14(4)32,
15(1)3,
15(1)4,
15(1)5,
15(2)7,
15(3)12,
15(4)15,
15(4)17,
16(2)8,
16(4)15,
16(4)17,
17(2)5,
17(2)6,
17(2)7,
17(2)8,
17(4)15,
17(4)16,
18(1)1,
18(2)6,
18(3)9,
18(4)14
- validation,
16(2)5
- victim,
12(2)13,
16(4)16,
17(2)8,
18(4)14
- vulnerable,
10(3)11,
10(4)5,
10(4)6,
11(3)15,
11(4)22,
12(2)11,
13(1)10,
13(3)25,
14(3)24,
14(3)27,
16(4)13,
17(1)4
- weak,
1(1)3,
2(3)230,
2(4)390,
10(4)5,
16(4)17,
17(2)7,
18(1)1
- well,
1(1)93,
10(1)2,
10(2)8,
10(3)11,
10(3)12,
11(1)3,
11(1)4,
11(2)5,
11(3)15,
12(1)1,
12(1)3,
12(1)5,
12(2)10,
13(1)10,
13(3)26,
14(1)3,
14(1)5,
14(1)14,
14(3)23,
15(3)12,
15(4)15,
15(4)18,
16(2)8,
17(3)9,
17(3)10,
17(3)11,
18(1)3,
18(2)5
- Windows,
5(4)398,
13(1)10,
16(2)7,
17(4)14