Publication:

Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables

Date

 
dc.contributor.authorXue, Nian
dc.contributor.authorMalla, Yashaswi
dc.contributor.authorXia, Zihang
dc.contributor.authorPopper, Christina
dc.contributor.authorVanhoef, Mathy
dc.date.accessioned2024-04-02T09:39:12Z
dc.date.available2024-01-08T17:18:49Z
dc.date.available2024-04-02T09:39:12Z
dc.date.issued2023
dc.description.wosFundingTextThis research is partially supported by the Center for Cyber Security at NYU Abu Dhabi; the Research Fund KU Leuven, and by the Flemish Research Programme Cybersecurity.
dc.identifier.eisbn978-1-939133-37-3
dc.identifier.issnN/A
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/43351
dc.publisherUSENIX ASSOC
dc.source.beginpage5719
dc.source.conference32nd USENIX Security Symposium
dc.source.conferencedateAUG 09-11, 2023
dc.source.conferencelocationAnaheim
dc.source.endpage5736
dc.source.journalN/A
dc.source.numberofpages18
dc.title

Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables

dc.typeProceedings paper
dspace.entity.typePublication
Files
Publication available in collections: