Login / Signup
Blind In/On-Path Attacks and Applications to VPNs.
William J. Tolley
Beau Kujath
Mohammad Taha Khan
Narseo Vallina-Rodriguez
Jedidiah R. Crandall
Published in:
USENIX Security Symposium (2021)
Keyphrases
</>
countermeasures
shortest path
malicious attacks
optimal path
malicious users
security threats
real time
watermarking scheme
motion deblurring
data sets
endpoints
end to end
computer security
path planning
watermarking method
signal processing
attack detection
multiple paths