Medusa: Unveil Memory Exhaustion DoS Vulnerabilities in Protocol Implementations.
Zhengjie DuYuekang LiYaowen ZhengXiaohan ZhangCen ZhangYi LiuSheikh Mahbub HabibXinghua LiLinzhang WangYang LiuBing MaoPublished in: WWW (2024)
Keyphrases
- denial of service
- denial of service attacks
- dos attacks
- lightweight
- state information
- information security
- memory requirements
- efficient implementation
- memory space
- interprocess communication
- security vulnerabilities
- communication protocol
- security protocols
- formal analysis
- authentication protocol
- security mechanisms
- memory usage
- computational power
- concurrency control
- data corruption
- intrusion detection system