- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources6
- Resource Type
-
0002300001000000
- More
- Availability
-
06
- Author / Contributor
- Filter by Author / Creator
-
-
Crandall, Jedidiah_R (6)
-
Mixon-Baca, Benjamin (3)
-
Habib, Sana (2)
-
Knockel, Jeffrey (2)
-
Bergen, Holly (1)
-
Daymude, Joshua_J (1)
-
Doupé, Adam (1)
-
Ensafi, Roya (1)
-
Espinoza, Antonio_M (1)
-
Gyatso, Lobsang (1)
-
Rodriguez, Esther (1)
-
Taha_Khan, Mohammad (1)
-
Thayai, Tenzin (1)
-
Xue, Diwen (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Free, publicly-accessible full text available October 13, 2026
-
Daymude, Joshua_J; Espinoza, Antonio_M; Bergen, Holly; Mixon-Baca, Benjamin; Knockel, Jeffrey; Crandall, Jedidiah_R (, ACM Computing Surveys)The battle for a more secure Internet is waged on many fronts, including the most basic of networking protocols. Our focus is theIPv4 Identifier(IPID), an IPv4 header field as old as the Internet with an equally long history as an exploited side channel for scanning network properties, inferring off-path connections, and poisoning DNS caches. This article taxonomizes the 25-year history of IPID-based exploits and the corresponding changes to IPID selection methods. By mathematically analyzing these methods’ correctness and security and empirically evaluating their performance, we reveal recommendations for best practice as well as shortcomings of current operating system implementations, emphasizing the value of systematic evaluations in network security.more » « lessFree, publicly-accessible full text available November 13, 2026
-
Mixon-Baca, Benjamin; Xue, Diwen; Ensafi, Roya; Crandall, Jedidiah_R (, ACM)Free, publicly-accessible full text available October 13, 2026
-
Mixon-Baca, Benjamin; Knockel, Jeffrey; Crandall, Jedidiah_R (, In the Proceedings of the Free and Open Communications on the Internet Workshop. (FOCI 2025))Free, publicly-accessible full text available July 14, 2026
-
Habib, Sana; Taha_Khan, Mohammad; Crandall, Jedidiah_R (, In the Proceedings of the Free and Open Communications on the Internet Workshop. (FOCI 2025))Free, publicly-accessible full text available February 20, 2026
-
Rodriguez, Esther; Gyatso, Lobsang; Thayai, Tenzin; Crandall, Jedidiah_R (, In the Proceedings of the Free and Open Communications on the Internet Workshop. (FOCI 2025))Free, publicly-accessible full text available February 20, 2026
An official website of the United States government
