Sept. 2, 2022, 1:20 a.m. | Amit Klein

cs.CR updates on arXiv.org arxiv.org

We analyzed the generation of protocol header fields in the implementations
of multiple TCP/IP network stacks and found new ways to leak information about
global protocol states. We then demonstrated new covert channels by remotely
observing and modifying the system's global state via these protocol fields.
Unlike earlier works, our research focuses on hosts that reside in firewalled
networks (including source address validation -- SAV), which is a very common
scenario nowadays. Our attacks are designed to be non-disruptive -- …

firewalls protocol states version

Information Security Engineers

@ D. E. Shaw Research | New York City

Cybersecurity Architect III

@ JPMorgan Chase & Co. | Columbus, OH, United States

Senior DevSecOps Engineer

@ Marlabs | Chennai, IN

Consultant Cyber Sécurité H/F

@ Hifield | Lyon, France

Cyber Security Consultant (Remote, US)

@ Crosslake Technologies | Remote (US)

PE Hub- SAP GRC/ IAG Consultant

@ SAP | Bengaluru, IN, 560066