نتایج جستجو برای: gps spoofing

تعداد نتایج: 34969  

Journal: :CoRR 2017
Hang Hu Peng Peng Gang Wang

Email spoofing is a critical step of phishing, where the attacker impersonates someone the victim knows or trusts. In this paper, we conduct a qualitative study to explore why email spoofing is still possible after years of efforts to develop and deploy anti-spoofing protocols (e.g., SPF, DKIM, DMARC). First, we measure the protocol adoption by scanning 1 million Internet domains. We find the a...

2014
Beulah Shekhar

The openness of wireless networks enables adversaries to deception as other devices. Spoofing attacks are vulnerable in wireless network, which are allowed the many form of attacks in the network. Wireless spoofing attacks are effortless to start and can extensively impact the performance of networks. A physical property coupled with each node is proposed which uses spatial information, hard to...

2017
Michael Witt Michael J. Witt Michael C. Roggemann Jeremy Bos Timothy Schulz Eugene Levin Daniel Fuhrmann

GPS is a critical tool often used in terrestrial location and navigation. However, GPS relies on a system of satellites in medium earth orbit and is prone to dropouts at higher latitudes, and may be susceptible to spoofing or other attacks. Thus, it is prudent to examine possible alternatives. Recently, star tracking has been of interest in global positioning. There are many implementations of ...

Journal: :The Journal of Korea Information and Communications Society 2013

2013
Pita Jarupunphol Wipawan Buathong

Visa 3-D Secure is an e-payment system based on the integration of SSL/TLS with the three-domain architecture. It employs cryptographic techniques to secure communication links among participants in e-commerce transactions and also provides credit card verification via Visa Secure Server. Although several security vulnerabilities can be addressed, spoofing attacks are still effective and can be...

2010
Toby Ehrenkranz Jun Li Patrick D. McDaniel

An innate deficiency of the Internet is its susceptibility to IP spoofing. Whereas a router uses a forwarding table to determine where it should send a packet, previous research has found that a router can similarly employ an incoming table to verify where a packet should come from, thereby detecting IP spoofing. Based on a previous protocol for building incoming tables, SAVE, this paper introd...

2014
Mark L. Psiaki Brady W. O'Hanlon Jahshan A. Bhatti Kyle D. Wesson Todd E. Humphreys

A method is developed to detect GNSS spoofing by processing beat carrier-phase measurements from a pair of antennas in a CDGPS-type calculation. This system Copyright © 2014 by Mark L. Psiaki, Brady W. O'Hanlon, Steven P. Powell, Jahshan A. Bhatti, Kyle D. Wesson, Todd E. Humphreys, & Andrew Schofield. All rights reserved. Preprint from ION GNSS+ 2014 detects spoofing attacks that are resistant...

Journal: :CoRR 2017
Luiz Souza Mauricio Pamplona Segundo Luciano Oliveira João Papa

The growing use of control access systems based on face recognition shed light over the need for even more accurate systems to detect face spoofing attacks. In this paper, an extensive analysis on face spoofing detection works published in the last decade is presented. The analyzed works are categorized by their fundamental parts, i.e., descriptors and classifiers. This structured survey also b...

2013
V Bharath Srinivas Syed Umar

Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. In this paper we propose a method for both detecting spoofing attacks, as well as locating the positions of adversaries performing the attacks. We first propose an attack detector for wireless spoofing that utilizes K-means cluster analysis. Next, we describe how we integrated our...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید