April 14, 2022, 1:20 a.m. | Amit Klein

cs.CR updates on arXiv.org arxiv.org

We analyzed the generation of protocol header fields in the implementations
of multiple TCP/IP network stacks and found new ways to leak information about
global protocol states. We then demonstrated new covert channels by remotely
observing and modifying the system's global state via these protocol fields.
Unlike earlier works, our research focuses on hosts that reside in firewalled
networks (including source address validation -- SAV), which is a very common
scenario nowadays. Our attacks are designed to be non-disruptive -- …

firewalls states version

Information Security Engineers

@ D. E. Shaw Research | New York City

Strategic Portfolio Leader - Communications and Electronic Warfare

@ Babcock | Bristol, GB, BS16 1EJ

Senior Security Analyst (GRC)

@ ASOS | London, United Kingdom

Ingénieur(e) Réseaux et Firewalling Cybersécurité - Toulouse

@ Sopra Steria | Colomiers, France

Security Lead - Malaysia

@ Control Risks | Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia

Cyber Security Engineer

@ Ecolab | IND-Bengaluru