نتایج جستجو برای: tls traffic analysis
تعداد نتایج: 2901176 فیلتر نتایج به سال:
Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...
Everyone is concerned about the Internet security, yet most traffic is not cryptographically protected. The usual justification is that most attackers are only off-path and cannot intercept traffic; hence, challenge-response mechanisms suffice to ensure authenticity. Usually, the challenges re-use existing ‘unpredictable’ header fields to protect widely-deployed protocols such as TCP and DNS. W...
This report describes an analysis of the Fitbit Flex ecosystem. Our objectives are to describe (1) the data Fitbit collects from its users, (2) the data Fitbit provides to its users, and (3) methods of recovering data not made available to device owners. Our analysis covers four distinct attack vectors. First, we analyze the security and privacy properties of the Fitbit device itself. Next, we ...
background: more than 20% of deaths from traffic crashes are related to pedestrians. this figure in tehran, the capital of iran, reaches to 40%. this study aimed to determine the high-risk areas and spatially analyze the traffic crashes, causing death to pedestrians in tehran. methods: mapping was used to display the distribution of the crashes. determining the distribution pattern of crashes...
Tumor lysis syndrome (TLS) is a potentially deadly complication of tumors or their treatment. This syndrome consists of a constellation of laboratory findings such as hyperuricemia, hyperkalemia, hyperphosphatemia, and hypocalcemia, known as laboratory TLS. When clinical complications such as seizures, acute renal failure, and cardiac dysrhythmias occur in patients with laboratory TLS, the synd...
Registration of point clouds is a fundamental issue in Light Detection and Ranging (LiDAR) remote sensing because point clouds scanned from multiple scan stations or by different platforms need to be transformed to a uniform coordinate reference frame. This paper proposes an efficient registration method based on genetic algorithm (GA) for automatic alignment of two terrestrial LiDAR scanning (...
We outline an end-to-end password authentication protocol for the web designed to be stateless and as secure as possible given legacy limitations of the web browser and performance constraints of commercial web servers. Our scheme is secure against very strong but passive attackers able to observe both network traffic and the server’s database state. At the same time, our scheme is simple for w...
Abstract We analyze the handshake protocol of Transport Layer Security (TLS) protocol, version 1.3. address both full TLS 1.3 (the one round-trip time mode, with signatures for authentication and (elliptic curve) Diffie–Hellman ephemeral ((EC)DHE) key exchange), abbreviated resumption/“PSK” mode which uses a pre-shared (with optional (EC)DHE exchange zero establishment). Our analysis in reducti...
Compound authentication protocols, such as EAP in IKEv2 or SASL over TLS, bind application-level authentication to a transport-level authenticated channel in order to obtain strong composite authentication under weak trust assumptions. Despite their wide deployment, these protocols remain poorly understood, leading to several credential forwarding man-in-themiddle attacks. We present formal mod...
– In-depth knowledge of the problem. – Understanding of the underlying architecture. – Knowledge on the parallel programming model. • OpenMP allows to parallelize code “avoiding” these requirements. • Compilers’ automatic parallelization only proceed when there is no risk. • Thread-Level Speculation (TLS) can extract parallelism when a compile-time dependence analysis can not guarantee that the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید