Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software

Provided by: University of New Haven
Topic: Security
Format: PDF
Remote attackers use network reconnaissance techniques, such as port scanning, to gain information about a victim machine and then use this information to launch an attack. Current network reconnaissance techniques that are typically below the application layer are limited in the sense that they can only give basic information, such as what services a victim is running. Furthermore, modern remote exploits typically come from a server and attack a client that has connected to it, rather than the attacker connecting directly to the victim.

Find By Topic