Abstract. We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of attacks concerns the compositional approach used to construct a parti...
We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our imp...
Network topology has no direct effect on the correctness of network protocols, however, it influences on the performance of networks and the survivability of the networks under at...
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and...