Authentication-Bypass Vulnerabilities in SOHO Routers.
Nadav RotenbergHaya ShulmanMichael WaidnerBenjamin ZeltserPublished in: SIGCOMM Posters and Demos (2017)
Keyphrases
- security mechanisms
- end to end
- information security
- load balancing
- security issues
- authentication scheme
- identity authentication
- resource constrained
- high speed
- user authentication
- security flaws
- security vulnerabilities
- image authentication
- authentication protocol
- security analysis
- security requirements
- countermeasures
- fragile watermarking
- biometric authentication
- data encryption
- smart card
- attack graph
- access control
- attack graphs
- real time
- authentication mechanism
- semi fragile watermarking
- multimodal biometrics
- ip address
- identity management
- network traffic
- sensor networks
- information systems