Show simple item record

Hijacking AFS

dc.contributor.authorHoneyman, P.en_US
dc.contributor.authorHuston, L. B.en_US
dc.contributor.authorStolarchuk, M. T.en_US
dc.date.accessioned2014-07-18T18:12:09Z
dc.date.available2014-07-18T18:12:09Z
dc.date.issued1991-08-28en_US
dc.identifier.citationP. Honeyman, L. B. Huston, and M. T. Stolarchuk, "Hijacking AFS", August 1991. [Proc. Winter USENIX Conf., San Francisco (January 1992).] <http://hdl.handle.net/2027.42/107968>en_US
dc.identifier.urihttps://hdl.handle.net/2027.42/107968
dc.description.abstractWe have identified several techniques that allow uncontrolled access to files managed by AFS 3.0. One method relies on administrative (or root) access to a user's workstation. Defending against this sort of attack is very difficult. Another class of attacks comes from promiscuous access to the physical network. Stronger cryptographic protocols, such as those employed by AFS 3.1, obviate this problem. These exercises help us understand vulnerabilities in the distributed systems that we employ (and deploy), and offer guidelines for securing them.en_US
dc.publisherCenter for Information Technology Integrationen_US
dc.titleHijacking AFSen_US
dc.typeTechnical Reporten_US
dc.subject.hlbsecondlevelComputer Scienceen_US
dc.subject.hlbtoplevelEngineeringen_US
dc.contributor.affiliationumCenter for Information Technology Integrationen_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/107968/1/citi-tr-91-4.pdf
dc.owningcollnameElectrical Engineering and Computer Science, Department of (EECS)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.