Hijacking AFS
dc.contributor.author | Honeyman, P. | en_US |
dc.contributor.author | Huston, L. B. | en_US |
dc.contributor.author | Stolarchuk, M. T. | en_US |
dc.date.accessioned | 2014-07-18T18:12:09Z | |
dc.date.available | 2014-07-18T18:12:09Z | |
dc.date.issued | 1991-08-28 | en_US |
dc.identifier.citation | P. Honeyman, L. B. Huston, and M. T. Stolarchuk, "Hijacking AFS", August 1991. [Proc. Winter USENIX Conf., San Francisco (January 1992).] <http://hdl.handle.net/2027.42/107968> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107968 | |
dc.description.abstract | We have identified several techniques that allow uncontrolled access to files managed by AFS 3.0. One method relies on administrative (or root) access to a user's workstation. Defending against this sort of attack is very difficult. Another class of attacks comes from promiscuous access to the physical network. Stronger cryptographic protocols, such as those employed by AFS 3.1, obviate this problem. These exercises help us understand vulnerabilities in the distributed systems that we employ (and deploy), and offer guidelines for securing them. | en_US |
dc.publisher | Center for Information Technology Integration | en_US |
dc.title | Hijacking AFS | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationum | Center for Information Technology Integration | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107968/1/citi-tr-91-4.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.