Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets.
Weiteng ChenZhiyun QianPublished in: USENIX Security Symposium (2018)
Keyphrases
- end to end
- ip networks
- mobile networks
- wireless link
- ip traffic
- high speed
- wifi
- wireless networks
- multi hop
- transport layer
- mobile devices
- network layer
- link layer
- congestion control
- wireless communication
- load balancing
- shortest path
- internet protocol
- mobile users
- network management
- quality of service
- base station
- cellular networks
- sensitive information
- distributed systems
- real time
- asked questions
- multipath
- search engine