Sciweavers

2 search results - page 1 / 1
» Profinet IO-Device Emulator based on the Man-in-the-middle A...
Sort
View
ETFA
2006
IEEE
13 years 11 months ago
Profinet IO-Device Emulator based on the Man-in-the-middle Attack
A Profinet IO Network of Class A uses standard Ethernet network components. If these network components can be attacked by e.g. a man-in-themiddle attack, this is also the case fo...
Michel Baud, Max Felser
EUROSYS
2006
ACM
14 years 1 months ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...