Login / Signup
You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology Obfuscation.
Xuanbo Huang
Kaiping Xue
Lutong Chen
Mingrui Ai
Huancheng Zhou
Bo Luo
Guofei Gu
Qibin Sun
Published in:
USENIX Security Symposium (2024)
Keyphrases
</>
network topology
ad hoc networks
network structure
routing protocol
network topologies
protein protein interactions
reverse engineering
overlay network
communication networks
mobile ad hoc networks