Back to Results
First PageMeta Content
Computing / Public-key cryptography / Internet / Security / Internet standards / Transport Layer Security / Buffer overflow / HTTP Secure / Transmission Control Protocol / Cryptographic protocols / Secure communication / Electronic commerce


Tales from the Crypt: fingerprinting attacks on encrypted channels by way of retainting Michael Valkering Asia Slowinska
Add to Reading List

Document Date: 2008-10-21 09:38:52


Open Document

File Size: 115,84 KB

Share Result on Facebook

City

Anaheim / West Lafayette / Brighton / Boston / Zurich / Leuven / Symposium / Alexandria / Miami / San Diego / San Jose / /

Company

ACM Press / COAST Laboratory / Symantec / IPSec / /

Country

Switzerland / Belgium / France / United States / United Kingdom / /

/

Event

Product Issues / /

Facility

SSL library / Library Interposition / OpenSSL library / /

IndustryTerm

tainted memory signature generation Internet filtering Figure / commodity software / communications security / higher-layer protocols / self-healing systems / untrusted helper applications / higher-level protocols / correspondence search / network intrusion detection systems / file systems / similarity search / web servers / naive algorithm / internet worms / honeypot systems / web server / naive solution / /

Movie

Tales from the Crypt / /

NaturalFeature

SSL stream / /

OperatingSystem

Linux / Ubuntu / SlackWare / Microsoft Windows / /

Organization

Institut Eurecom / /

Person

Michael Valkering Asia Slowinska Herbert / /

Product

memory guest OS / memory signature generation Internet filtering Figure / data / data item / Unicode character encodings / memory region / Hassle / /

ProgrammingLanguage

L / /

ProvinceOrState

Indiana / Washington / Manitoba / Florida / California / Massachusetts / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

RAM / higher-level protocols / SSL encryption / Linux / operating system / UDP / SSL / encryption / ASCII / layer-2 encryption / channel encryption / naive algorithm / http / applications using encryption / higher-layer protocols / web server / /

URL

http /

SocialTag