Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security 2022
DOI: 10.1145/3488932.3497767
|View full text |Cite
|
Sign up to set email alerts
|

Mirror, Mirror on the Wall

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…The authors in [168] investigated the environment reconfiguraton attack (ERA) which is a wireless jamming attack primitive. The system setup is composed of legitimate transmitter, receiver and an eavesdropper that employ OFDM modulation technique along with RIS.…”
Section: Volume 15mentioning
confidence: 99%
“…The authors in [168] investigated the environment reconfiguraton attack (ERA) which is a wireless jamming attack primitive. The system setup is composed of legitimate transmitter, receiver and an eavesdropper that employ OFDM modulation technique along with RIS.…”
Section: Volume 15mentioning
confidence: 99%
“…However, previous works rarely considered that RIS could likewise be controlled by an attacker. In the context of disrupting wireless communications, Staat et al demonstrated how an RIS can disrupt Wi-Fi networks [21]. In the context of CRKG, we have partially investigated an example of the RIS jamming attack in our previous work [22].…”
Section: Related Workmentioning
confidence: 99%
“…Network attacks can be classified as denial of service (DoS) attacks [3], deception attacks [4], and reconfiguration attacks [5]. As the most widespread type, DoS attacks can make the attacked hosts and servers deny normal access to users and eventually make the server resources exhausted by occupying a large number of band width resources.…”
Section: Introductionmentioning
confidence: 99%