Active Mapping: Resisting NIDS Evasion without Altering Traffic
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Overview of security issues of VOIP
IMSA'07 IASTED European Conference on Proceedings of the IASTED European Conference: internet and multimedia systems and applications
On the (un)reliability of eavesdropping
International Journal of Security and Networks
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Can they hear me now?: a security analysis of law enforcement wiretaps
Proceedings of the 16th ACM conference on Computer and communications security
Overview of security issues of VoIP
EurolMSA '07 Proceedings of the Third IASTED European Conference on Internet and Multimedia Systems and Applications
PinDr0p: using single-ended audio features to determine call provenance
Proceedings of the 17th ACM conference on Computer and communications security
Cellular telephony and the question of privacy
Communications of the ACM
Protecting against physical resource monitoring
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear
Proceedings of the 4th ACM conference on Data and application security and privacy
Hi-index | 0.02 |
Many law enforcement wiretap systems are vulnerable to simple, unilateral countermeasures that exploit the unprotected in-band signals passed between the telephone network and the collection system. This article describes the problem as well as some remedies and workarounds.