Stalloris: RPKI Downgrade Attack.
Tomas HlavacekPhilipp JeitnerDonika MirditaHaya ShulmanMichael WaidnerPublished in: USENIX Security Symposium (2022)
Keyphrases
- attack detection
- countermeasures
- malicious users
- detection mechanism
- authentication mechanism
- information retrieval
- information systems
- database systems
- key exchange protocol
- malicious attacks
- security measures
- cyber attacks
- databases
- decision trees
- computer vision
- social networks
- artificial intelligence
- data mining
- real world