- The unauthorized alteration of certain system files is one of the symptoms of an active attack, or compromise upon a system.
- The 3GPP authentication and key agreement has two security shortages. One is that it needs a strong secure channel assumption between the VLR and the HLR,and will easily suffer from the active attack after the adversary accesses the channel.
- The conclusion was that both A and B players got higher active attack than the passive one for the attack count and score successful rate, in other words, they belonged to the active attack players.
- The paper simply analyzes the different of EMI,EMC,EML and Tempest and the mechanism of EML of computer. Some kinds of protection measure are presented. We should be aware of the big threat of active attacks.
简要分析了计算机 EMI,EMC,EML和 TEMPEST之间的区别及计算机主要信息泄漏源的泄漏机理 ,并介绍了相应的硬件防护技术及新型软件防护技术 ,分析了它们各自的优势与劣势 ,提出我们应注意到窃取者的主动攻击给计算机信息泄漏问题造成的更大威胁
- Key size is not the only major security limitation in WEP. Cracking a longer key requires interception of more packets, but there are active attacks that stimulate the necessary traffic.
WEP 不是强制使用的，使得许多设施根本就没有启动 WEP；以及WEP 并不包含钥匙管理协定，郤依赖在用户间共用一个秘密钥匙。