Show simple item record

dc.contributor.authorXue, Nian
dc.contributor.authorMalla, Yashaswi
dc.contributor.authorXia, Zihang
dc.contributor.authorPopper, Christina
dc.contributor.authorVanhoef, Mathy
dc.date.accessioned2024-04-02T09:39:12Z
dc.date.available2024-01-08T17:18:49Z
dc.date.available2024-04-02T09:39:12Z
dc.date.issued2023
dc.identifier.issnN/A
dc.identifier.otherWOS:001066451505051
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/43351.2
dc.sourceWOS
dc.titleBypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables
dc.typeProceedings paper
dc.identifier.eisbn978-1-939133-37-3
dc.source.numberofpages18
dc.source.peerreviewyes
dc.source.beginpage5719
dc.source.endpage5736
dc.source.conference32nd USENIX Security Symposium
dc.source.conferencedateAUG 09-11, 2023
dc.source.conferencelocationAnaheim
dc.source.journalN/A
imec.availabilityPublished - imec
dc.description.wosFundingTextThis research is partially supported by the Center for Cyber Security at NYU Abu Dhabi; the Research Fund KU Leuven, and by the Flemish Research Programme Cybersecurity.


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following collection(s)

Show simple item record

VersionItemDateSummary

*Selected version