Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID., , , , and . IEEE/ACM Trans. Netw., 30 (1): 409-422 (2022)Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency., , , , and . TrustCom, page 1-12. IEEE, (2020)Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects., , , , and . SP, page 3162-3177. IEEE, (2023)The Side-Channel Vulnerability in Network Protocol., , , and . ICCNS, page 1-8. ACM, (2021)Off-Path TCP Exploits of the Mixed IPID Assignment., , , , and . CCS, page 1323-1335. ACM, (2020)Research on survivability metrics based on survivable process of network system., , , , , and . SIN, page 247-250. ACM, (2011)Traffic Hijacking in Wi-Fi Networks via ICMP Redirects., , , , and . ACM TUR-C, page 141-142. ACM, (2023)Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks., , , , , , , and . USENIX Security Symposium, page 2619-2636. USENIX Association, (2022)PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP., , , , , , , , and . NDSS, The Internet Society, (2022)A Reliable Lightweight Communication Method via Chain Verification., and . ICSRS, page 81-85. IEEE, (2019)