The Community for Technology Leaders
RSS Icon
Issue No.06 - November/December (2007 vol.5)
pp: 74-77
Luiz Felipe Perrone , Bucknell University
In an attempt to encourage engineers and security analysts to look at systems from the strangest perspectives, the author offers two examples why this is important: the first comes from the journalistic media the second comes from his group's research in protocol security for wireless ad hoc networking.
secure systems, security analysis, simple exploits
Luiz Felipe Perrone, "Could a Caveman Do It? The Surprising Potential of Simple Attacks", IEEE Security & Privacy, vol.5, no. 6, pp. 74-77, November/December 2007, doi:10.1109/MSP.2007.162
1. F. Anjum and P. Mouchtaris, Security for Wireless Ad Hoc Networks, Wiley-Interscience, 2007.
2. T. Bridis and E. Sullivan, "US Video Shows Hacker Hit on Power Grid,"27 Sept. 2007; www.physorg.comnews110104929.html.
3. J. Kovalich, "Ill-fated Squirrel Leaves Thousands without Electricity," 2004, The Enterprise; 2004/08/31/news/newsnews03.txt.
4. L.F. Perrone and S.C. Nelson, "A Study of On-Off Attack Models for Wireless Ad Hoc Networks," Proc. 1st Workshop Operator-Assisted (Wireless Mesh) Community Networks, IEEE Press, 2006; .
5. L.M. Feeney and M. Nilsson, "Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment," Proc. IEEE Conf. Computer Comm. (Infocom 01), IEEE Press, 2001, pp. 1548–1557.
6. M. Guirguis et al., "Adversarial Exploits of End-Systems Adaptation Dynamics," J. Parallel and Distributed Computing, vol. 67, no. 3, 2007, pp. 318–335.
7. R. Bejtlich, "Be the Caveman,"28 Sept. 2007; .
8. C. Perkins and E. Belding-Royer, "Ad Hoc On-Demand Distance Vector (AODV) Routing," IETF RFC 3561, July 2003;
8 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool