Now showing items 1-2 of 2
Abusers don’t get Privacy. Sensitively Logging and Blocking Tor Abuse
Tor has a significant problem with malicious traffic routed through Tor exit nodes. They create a credible reason for websites to discriminate against Tor users. The abuse also creates a strong disincentive to run exit nodes since the exit node operators have to deal with abuse messages and possible law enforcement ...
A Survey on Sender Identification Methodologies for the Controller Area Network
The connectivity of modern vehicles is constantly increasing and consequently also the amount of attack vectors. Researchers have shown that it is possible to access internal vehicle communication via wireless connections, allowing the manipulation of safety-critical functions such as brakes and steering. If a Electronic ...