A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
The overlay scan attack
2014
Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems - DEBS '14
While pub/sub communication middleware has become mainstream in many application domains, little has been done to assess its weaknesses from a security standpoint. Complex attacks are usually planned by attackers by carefully analyzing the victim to identify those systems that, if successfully targeted, could provide the most effective result. In this paper we show that some pub/sub middleware are inherently vulnerable to a specific kind of preparatory attack, namely the Overlay Scan Attack,
doi:10.1145/2611286.2611295
dblp:conf/debs/AnielloBCLFQ14
fatcat:vvegfm7pbnahzki4nrnhvwsdvm