2021
DOI: 10.48550/arxiv.2112.09604
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Subverting Stateful Firewalls with Protocol States (Extended Version)

Abstract: We analyzed the generation of protocol header fields in the implementations of multiple TCP/IP network stacks and found new ways to leak information about global protocol states. We then demonstrated new covert channels by remotely observing and modifying the system's global state via these protocol fields. Unlike earlier works, our research focuses on hosts that reside in firewalled networks (including source address validation -SAV), which is a very common scenario nowadays. Our attacks are designed to be no… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 18 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?