Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks.
Ralf-Philipp WeinmannPublished in: WOOT (2012)
Keyphrases
- cryptographic protocols
- security protocols
- denial of service attacks
- secure routing
- tcp ip
- remote server
- cryptographic algorithms
- wide area network
- cellular automata
- countermeasures
- real time
- memory requirements
- memory usage
- security mechanisms
- lightweight
- security threats
- authentication protocol
- standard model
- state information
- communication protocol
- data corruption
- main memory
- interprocess communication
- ddos attacks
- attack scenarios
- routing protocol