Sciweavers

Share
INFOCOM
1996
IEEE

Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions

8 years 7 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environments. However, there exist several security vulnerabilities in the TCP speci cation and additional weaknesses in a number of widely-available implementations of TCP. These vulnerabilities may enable an intruder to attack" TCP-based systems, enabling him her to hijack" a TCP connection or cause denial of service to legitimate users. We analyze TCP code via a reverse engineering" technique called slicing" to identify several of these vulnerabilities, especially those that are related to the TCP state-transition diagram. We discuss many of the aws present in the TCP implementation of many widely used operating systems, such as SUNOS
Biswaroop Guha, Biswanath Mukherjee
Added 07 Aug 2010
Updated 07 Aug 2010
Type Conference
Year 1996
Where INFOCOM
Authors Biswaroop Guha, Biswanath Mukherjee
Comments (0)
books