Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables.
Nian XueYashaswi MallaZihang XiaChristina PöpperMathy VanhoefPublished in: USENIX Security Symposium (2023)
Keyphrases
- routing tables
- routing table
- routing algorithm
- ip address
- routing protocol
- ad hoc networks
- shortest path
- network traffic
- multipath
- wireless sensor networks
- inter domain
- network security
- network topology
- ip addresses
- energy consumption
- network resources
- traffic flow
- tcp ip
- network coding
- data transmission
- network layer
- real time