Filters








254 Hits in 7.2 sec

MUST, SHOULD, DON'T CARE: TCP Conformance in the Wild [chapter]

Mike Kosek, Leo Blöcher, Jan Rüth, Torsten Zimmermann, Oliver Hohlfeld
2020 Lecture Notes in Computer Science  
In case of TCP that carries the bulk of the Internets' traffic, these requirements are defined in RFCs.  ...  Standards govern the SHOULD and MUST requirements for protocol implementers for interoperability.  ...  Acknowledgments This work has been funded by the DFG as part of the CRC 1053 MAKI within subproject B1.  ... 
doi:10.1007/978-3-030-44081-7_8 fatcat:6agtloamvzblvh2msdbawgkwbi

Is it still possible to extend TCP?

Michio Honda, Yoshifumi Nishida, Costin Raiciu, Adam Greenhalgh, Mark Handley, Hideyuki Tokuda
2011 Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference - IMC '11  
We find that MPTCP is likely to work correctly in the Internet or fallback to regular TCP.  ...  Is the same true for TCP?  ...  Middleboxes currently deployed in the wild are relatively benign from our measurements; all paths conformed to our first three recommendations.  ... 
doi:10.1145/2068816.2068834 dblp:conf/imc/HondaNRGHT11 fatcat:ssepa5km6vg23da6sx7vfndmda

On the effective evaluation of TCP

Mark Allman, Aaron Falk
1999 Computer communication review  
In order for TCP research to be independently evaluated in the Interact research community there is a set of questions that researchers should try to answer.  ...  Understanding the performance of the Intemet's Transmission Control Protocol (TCP) is important because it is the dominant protocol used in the lnternet today.  ...  Acknowledgments We thank all the researchers who have helped us understand TCP and the proper way to evaluate TCP performance over the years.  ... 
doi:10.1145/505696.505703 fatcat:mzimgkreavev5i5sqbm5gpbhhy

Delivering a Secured Cloud Computing Architecture and Traditional IT Outsourcing Environment via Penetration Tools in Ghana

Umar Sayibu, Department of Mathematics/ICT, Bagabaga College of Education, Tamale, +233, Ghana, Frimpong Twum, Issah Baako
2019 International Journal of Computer Network and Information Security  
In all, RFI constitutes the most serious potential threat and it needs the fullest attention of CC service providers.  ...  Nmap disclosed opened ports in Traditional ITO Virtual Private Network which can make the server of the provider accessible to hackers leading to a considerable disclosure of information to unauthorized  ...  the wild in July 2013.  ... 
doi:10.5815/ijcnis.2019.11.06 fatcat:ant7vdyuq5h5zola3r2tcxdsc4

Practical, scalable alternative session encryption using one-time pads [article]

Marc W. Abel
2012 arXiv   pre-print
I don't know how to recover an AES key or compute the discrete logarithm of an elliptic curve element, but there exists no proof that another cannot.  ...  I also discuss my own implementations, their capabilities and track record, and where they should lead.  ...  The plain truth is, UDP is more secure than TCP.  ... 
arXiv:1212.5086v1 fatcat:fsibkstwyjdr7g2yl5wiwciekq

A methodology for studying persistency aspects of internet flows

Jörg Wallerich, Holger Dreger, Anja Feldmann, Balachander Krishnamurthy, Walter Willinger
2005 Computer communication review  
The research of the authors is supported in part by EPSRC grant GR/S86266/01.  ...  Acknowledgments We would like to thank AT&T Labs Research for providing access to Netflow data and Leibnitz Rechenzentrum, München for their help in collecting packet traces.  ...  At this point, we must face a major issue. How should the source TCI' format segments destined for the same destination TCP? We consider two cases.  ... 
doi:10.1145/1064413.1064417 fatcat:b5leqpkvmnd5paw2vws4mqhlme

From IP ID to Device ID and KASLR Bypass (Extended Version) [article]

Amit Klein, Benny Pinkas
2019 arXiv   pre-print
We deployed a demo (for Windows) showing that key extraction and machine fingerprinting works in the wild, and tested it from networks around the world.  ...  Our work examines the generation of this field in Windows (versions 8 and higher), Linux and Android, and shows that the IP ID field enables remote servers to assign a unique ID to each device and thus  ...  care 32 Redmi Note 4 Xiaomi Mi4 0.15 Android (ARM64) 3.18.0-3.18.6 3.10.53+ 3.4.103-3.4.108 A 1 100 No No Don't care 32 Samsung J7 prime Samsung S7 Meizu M2 Note 0.15 9 Acknowledgements  ... 
arXiv:1906.10478v2 fatcat:aqxxj4w54bhstbonrts23gy4qq

Hints and Principles for Computer System Design [article]

Butler Lampson
2021 arXiv   pre-print
It also gives some principles for system design that are more than just hints, and many examples of how to apply the ideas.  ...  This new long version of my 1983 paper suggests the goals you might have for your system -- Simple, Timely, Efficient, Adaptable, Dependable, Yummy (STEADY) -- and techniques for achieving them -- Approximate  ...  In general, abstractions don't keep secrets very well. If you care about side channels, don't share resources.  ... 
arXiv:2011.02455v3 fatcat:jolyz5lknjdbpjpxjcrx5rh6fa

I know where you are and what you are sharing

Stevens Le Blond, Chao Zhang, Arnaud Legout, Keith Ross, Walid Dabbous
2011 Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference - IMC '11  
We also consider the linkability threat, in which the identified user is linked to his Internet usage.  ...  In this paper, we show how to exploit real-time communication applications to determine the IP address of a targeted user.  ...  We would like to thank the volunteers for the considerable amount of time they have spent to help us test our scheme.  ... 
doi:10.1145/2068816.2068822 dblp:conf/imc/Le-BlondZLRD11 fatcat:v2qu5sj2urefja5crd6b6oknpm

An Automated Framework for Validating Firewall Policy Enforcement

Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-Shaer, Frank Lin, Christopher Pham, Sheng Li
2007 Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)  
In addition, in most cases the policies used during testing are limited and manually generated representing fixed policy profiles.  ...  In this paper, we present a framework for automatic testing of the firewall policy enforcement or implementation using efficient random traffic and policy generation techniques.  ...  Bit can have one of three possibilities; one, zero or don't care (as in the case of wild cards in source/destination address).  ... 
doi:10.1109/policy.2007.5 dblp:conf/policy/El-AtawySWALPL07 fatcat:lnjph45t6vhmxlcdkw7cvbetwe

The Layers Principle: Internet Architecture and the Law

Lawrence B. Solum, Minn Chung
2003 Social Science Research Network  
IP in TCP/IP.  ...  The regulation says: "If the data are coming from or going to the IP address xxx.yyy.zzz, then don't deliver that data."  ...  However, they are different in significant ways as a consequence of a critical distinction between the TCP/IP layers and the communication system layers.  ... 
doi:10.2139/ssrn.416263 fatcat:pskwxoakgjhpndmchtfyhqvlxm

Automated pseudo-live testing of firewall configuration enforcement

Ehab Al-Shaer, Adel El-Atawy, Taghrid Samak
2009 IEEE Journal on Selected Areas in Communications  
In addition, in most cases the policies used during testing are manually generated or have limited configuration profiles.  ...  In a typical test session, a large set of different policies are generated based on the access-control list (ACL) grammar and according to custom profiles.  ...  Bits can have one of three possibilities; one, zero or don't care (as in the case of wild cards in source/destination address).  ... 
doi:10.1109/jsac.2009.090406 fatcat:kqholoevtvcbnhqhfcwvmsa3zq

Infosphere project

Calton Pu, Karsten Schwan, Jonathan Walpole
2001 SIGMOD record  
The main technical contribution is the ]nfopipe abstraction to support information flow with quality of service.  ...  We describe the Infosphere project, which is building the systems software support for information-driven applications such as digital libraries and electronic commerce.  ...  The Typespec of Infopipe A's consumer end must conform to the Typespec of Infopipe B's producer end for them to be connected.  ... 
doi:10.1145/373626.373680 fatcat:xe2x4uraxza5pechg5g56e3m4a

I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy [article]

Stevens Le Blond , Arnaud Legout, Keith W. Ross, Walid Dabbous (INRIA Sophia Antipolis / INRIA Grenoble Rhône-Alpes)
2011 arXiv   pre-print
We also consider the linkability threat, in which the identified user is linked to his Internet usage.  ...  In this paper, we show how to exploit real-time communication applications to determine the IP address of a targeted user.  ...  We would like to thank the volunteers for the considerable amount of time they have spent to help us test our scheme.  ... 
arXiv:1109.4039v3 fatcat:l7xanqr2erhjxfen5bpbis347a

Beetle

Amit A. Levy, James Hong, Laurynas Riliskis, Philip Levis, Keith Winstein
2016 Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services - MobiSys '16  
We present Beetle, a new hardware interface that virtualizes peripherals at the application layer, allowing safe access by multiple programs without requiring the operating system to understand hardware  ...  The next generation of computing peripherals will be lowpower ubiquitous computing devices such as door locks, smart watches, and heart rate monitors.  ...  Acknowledgments We would like to thank Jason Flinn, David Mazieres, David Terei and the anonymous reviewers for their thoughtful comments.  ... 
doi:10.1145/2906388.2906414 dblp:conf/mobisys/LevyHRLW16 fatcat:eilnth7r2bca5c5rw6ui66gsve
« Previous Showing results 1 — 15 out of 254 results