Computer Network’s Time (Synchronization) Systems Espionage and Its Possible Consequences
This paper proposes cryptanalysis attacks on network time (synchronization) systems method (computer espionage) based on timestamp fractional value falsification that software’s implant realizes. For massive time stamps using in a public key infrastructure, the considered method of attack can comple...
Main Authors: | Dmitry Anatolevich Melnikov, Vladislav Romanovich Petrov, Evgeny Vasilevich Dirienko, Anton Anatolevich Abramov, Ivan Alexandrovich Korsakov, Stanislav Sergeevich Kuzminov |
---|---|
Format: | Article |
Language: | English |
Published: |
Moscow Engineering Physics Institute
2013-12-01
|
Series: | Bezopasnostʹ Informacionnyh Tehnologij |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/305 |
Similar Items
-
Attacks on the Network Synchronization Systems Counteraction Method Implemented in the Software and Hardware Device «MARSH! 3.0»
by: Dmitry Anatolevich Melnikov, et al.
Published: (2013-12-01) -
Information Technology Systems Vulnerabilities Detecting based on Network’s Traffic Analysis
by: Dmitry Anatolevich Melnikov, et al.
Published: (2013-12-01) -
Investigation of the Problem of IT Espionage Using Causal Diagrams
by: Ekaterina Romanovna Knyazeva, et al.
Published: (2015-03-01) -
LEGAL ASPECTS OF ECONOMIC ESPIONAGE
by: Ovidiu Horia Maican
Published: (2019-12-01) -
REVIEW: Riveting National Press Club tales of espionage
by: Stephen Ellmers
Published: (2019-07-01)