Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis

C Fu, Q Li, K Xu - arxiv preprint arxiv:2301.13686, 2023 - arxiv.org
In this paper, we propose HyperVision, a realtime unsupervised machine learning (ML)
based malicious traffic detection system. Particularly, HyperVision is able to detect unknown …

{FlowBlaze}: Stateful packet processing in hardware

S Pontarelli, R Bifulco, M Bonola, C Cascone… - … USENIX Symposium on …, 2019 - usenix.org
Programmable NICs allow for better scalability to handle growing network workloads,
however, providing an expressive, yet simple, abstraction to program stateful network …

Dns cache poisoning attack reloaded: Revolutions with side channels

K Man, Z Qian, Z Wang, X Zheng, Y Huang… - Proceedings of the 2020 …, 2020 - dl.acm.org
In this paper, we report a series of flaws in the software stack that leads to a strong revival of
DNS cache poisoning---a classic attack which is mitigated in practice with simple and …

Peeking into your app without actually seeing it:{UI} state inference and novel android attacks

QA Chen, Z Qian, ZM Mao - 23rd USENIX Security Symposium (USENIX …, 2014 - usenix.org
The security of smartphone GUI frameworks remains an important yet under-scrutinized
topic. In this paper, we report that on the Android system (and likely other OSes), a weaker …

ENDEMIC: End-to-End Network Disruptions-Examining Middleboxes, Issues, and Countermeasures-A Survey

I Benhabbour, M Dacier - ACM Computing Surveys, 2025 - dl.acm.org
Network middleboxes are important components in modern networking systems, impacting
approximately 40% of network paths according to recent studies [1]. This survey paper …

Dns cache poisoning attack: Resurrections with side channels

K Man, X Zhou, Z Qian - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
DNS is one of the fundamental and ancient protocols on the Internet that supports many
network applications and services. Unfortunately, DNS was designed without security in …

Off-path hacking: The illusion of challenge-response authentication

Y Gilad, A Herzberg, H Shulman - IEEE Security & Privacy, 2013 - ieeexplore.ieee.org
Everyone is concerned about Internet security, yet most traffic isn't cryptographically
protected. The typical justification is that most attackers are off path and can't intercept traffic; …

TCP spoofing: Reliable payload transmission past the spoofed TCP handshake

Y Pan, C Rossow - 2024 IEEE Symposium on Security and …, 2024 - ieeexplore.ieee.org
TCP spoofing—the attack to establish an IP-spoofed TCP connection by bruteforcing a 32-bit
server-chosen initial sequence number (ISN)—has been known for decades. However, TCP …

Insecurity of voice solution VoLTE in LTE mobile networks

CY Li, GH Tu, C Peng, Z Yuan, Y Li, S Lu… - Proceedings of the 22nd …, 2015 - dl.acm.org
VoLTE (Voice-over-LTE) is the designated voice solution to the LTE mobile network, and its
worldwide deployment is underway. It reshapes call services from the traditional circuit …

Off-path TCP exploits of the mixed IPID assignment

X Feng, C Fu, Q Li, K Sun, K Xu - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
In this paper, we uncover a new off-path TCP hijacking attack that can be used to terminate
victim TCP connections or inject forged data into victim TCP connections by manipulating …