[1]Papadopoulos P, Kourtellis N, Markatos E P. Exclusive: How the (synced) cookie monster breached my encrypted vpn session[C] Proc of the 11th European Workshop on Systems Security. New York: ACM, 2018: 16[2]Kent S, Seo K. RFC 4301: Security architecture for the Internet protocol[EBOL]. 2005 [20250115]. https:www.rfceditor.orgrfcrfc4301[3]Kaufman C. RFC 4306: Internet key exchange (IKEv2) protocol[EBOL]. 2005 [20250115]. https:www.rfceditor.orgrfcrfc4306[4]Bhargavan K, Leurent G. Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH[C] Proc of Network and Distributed System Security Symposium (NDSS 2016). Piscataway, NJ: IEEE, 2016: 118[5]Yao A C C, Zhao Y. Privacypreserving authenticated keyexchange over internet[J]. IEEE Trans on Information Forensics and Security, 2013, 9(1): 125140[6]Nir Y,Smyslov V. Protecting internet key exchange protocol version 2 (IKEv2) implementations from distributed denialofservice attacks[ROL]. https:www.rfceditor.orgrfcrfc8019, 2016[7]Hemme L. A differential fault attack against early rounds of (triple) DES[C] Proc of Int Workshop on Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2004: 254267[8]Kuznetsov A A. Parallel algorithm for MD5 collision attack[J]. Program Systems: Theory and Applications, 2015, 6(3): 6172[9]Kang B H, Balitanas M O. Vulnerabilities of VPN using IPSec and defensive measures[J]. International Journal of Advanced Science and Technology, 2009, 8(7): 918[10]Felsch D, Grothe M, Schwenk J, et al. The dangers of key reuse: Practical attacks on {IPsec}{IKE}[C] Proc of the 27th USENIX Security Symposium (USENIX Security 18). Berkeley, CA: USENIX Association, 2018: 567583[11]Ninet T, Legay A, Maillard R, et al. The deviation attack: A novel denialofservice attack against IKEv2[C] Proc of the 18th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications13th IEEE Int Conf on Big Data Science and Engineering (TrustComBigDataSE). Piscataway, NJ: IEEE, 2019: 6674[12]Cremers C. Key exchange in IPsec revisited: Formal analysis of IKEv1 and IKEv2[C] Proc of the 16th European Symp on Research in Computer Security(ESORICS 2011). Berlin: Springer, 2011: 315334[13]周梓馨, 张功萱, 寇小勇, 等. 一种基于自注意力机制的深度学习侧信道攻击方法[J]. 信息安全研究, 2022, 8(8): 812824[14]Taylor V F,Spolaor R, Conti M, et al. Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic[C] Proc of the 2016 IEEE European Symp on Security and Privacy (EuroS&P). Piscataway, NJ: IEEE, 2016: 439454[15]Herzog J. A computational interpretation of Dolev—Yao adversaries[J]. Theoretical Computer Science, 2005, 340(1): 5781[16]Meadows C. Analysis of the Internet key exchange protocol using the NRL protocol analyzer[C] Proc of the 1999 IEEE Symp on Security and Privacy (Cat No 99CB36344). Piscataway, NJ: IEEE, 1999: 216231[17]Permadi K B, Seta H B, Astriratma R. Pengamanan jaringan wireless LAN dengan protokol EAPTTLS dan otentikasi MSCHAPv2 pada fakultas ilmu komputer UPN veteran jakarta[J]. Informatik: Jurnal Ilmu Komputer, 2020, 16(2): 95105[18]Shannon C E. A mathematical theory of communication[J]. The Bell System Technical Journal, 1948, 27(3): 379423 |