Publication:
Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables
Date
| dc.contributor.author | Xue, Nian | |
| dc.contributor.author | Malla, Yashaswi | |
| dc.contributor.author | Xia, Zihang | |
| dc.contributor.author | Popper, Christina | |
| dc.contributor.author | Vanhoef, Mathy | |
| dc.date.accessioned | 2024-04-02T09:39:12Z | |
| dc.date.available | 2024-01-08T17:18:49Z | |
| dc.date.available | 2024-04-02T09:39:12Z | |
| dc.date.issued | 2023 | |
| dc.description.wosFundingText | This research is partially supported by the Center for Cyber Security at NYU Abu Dhabi; the Research Fund KU Leuven, and by the Flemish Research Programme Cybersecurity. | |
| dc.identifier.eisbn | 978-1-939133-37-3 | |
| dc.identifier.issn | N/A | |
| dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/43351 | |
| dc.publisher | USENIX ASSOC | |
| dc.source.beginpage | 5719 | |
| dc.source.conference | 32nd USENIX Security Symposium | |
| dc.source.conferencedate | AUG 09-11, 2023 | |
| dc.source.conferencelocation | Anaheim | |
| dc.source.endpage | 5736 | |
| dc.source.journal | N/A | |
| dc.source.numberofpages | 18 | |
| dc.title | Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables | |
| dc.type | Proceedings paper | |
| dspace.entity.type | Publication | |
| Files | ||
| Publication available in collections: |