Filters








2 Hits in 5.0 sec

"Roto-Rooting" your router

Danai Chasaki
2011 Proceedings of the ACM SIGCOMM 2011 conference on SIGCOMM - SIGCOMM '11  
Modern routers use general purpose programmable processors, and the software used for packet processing on these systems is potentially vulnerable to remote exploits.  ...  Our work presents the first practical example of an entirely new class of network attacks -attacks that target the network infrastructure.  ...  Our router "roto-rooting" technique is a hardware based solution adapted from embedded systems security literature.  ... 
doi:10.1145/2018436.2018486 dblp:conf/sigcomm/Chasaki11 fatcat:hu3kulnk7fdpfbhgm36rrcl4ha

"Roto-Rooting" your router

Danai Chasaki
2011 Computer communication review  
Modern routers use general purpose programmable processors, and the software used for packet processing on these systems is potentially vulnerable to remote exploits.  ...  Our work presents the first practical example of an entirely new class of network attacks -attacks that target the network infrastructure.  ...  Our router "roto-rooting" technique is a hardware based solution adapted from embedded systems security literature.  ... 
doi:10.1145/2043164.2018486 fatcat:aow5xxrzfjg2tchvlbmbn4wgdu