Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Replay attack

Known as: Playback attack, Freshness, Freshness (cryptography) 
A replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
The ASVspoof initiative was created to promote the development of countermeasures which aim to protect automatic speaker… Expand
  • table 1
  • table 2
  • figure 1
  • table 4
  • table 3
Is this relevant?
Highly Cited
2017
Highly Cited
2017
Nowadays spoofing detection is one of the priority research areas in the field of automatic speaker verification. The success of… Expand
  • figure 3
  • figure 2
  • figure 1
  • table 2
  • table 1
Is this relevant?
Highly Cited
2014
Highly Cited
2014
This technical note studies a resilient control problem for discrete-time, linear time-invariant systems subject to state and… Expand
  • figure 1
  • table I
  • figure 2
Is this relevant?
Highly Cited
2013
Highly Cited
2013
The existing tradeoff between control system performance and the detection rate for replay attacks highlights the need to provide… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
In this paper, we describe a system for detecting spoofing attacks on speaker verification systems. We understand as spoofing the… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 7
  • figure 6
Is this relevant?
Highly Cited
2009
Highly Cited
2009
  • Yilin Mo, B. Sinopoli
  • 47th Annual Allerton Conference on Communication…
  • 2009
  • Corpus ID: 11668209
This paper analyzes the effect of replay attacks on a control system. We assume an attacker wishes to disrupt the operation of a… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Replay attacks are often the most costly attacks to thwart when dealing with off-chip memory integrity. With a trusted System-on… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Gaph Teory Fourth Edition Th is standard textbook of modern graph theory, now in its fourth edition, combines the authority of a… Expand
Is this relevant?
Highly Cited
1994
Highly Cited
1994
  • Paul F. Syverson
  • Proceedings The Computer Security Foundations…
  • 1994
  • Corpus ID: 5555422
This paper presents a taxonomy of replay attacks on cryptographic protocols in terms of message origin and destination. The… Expand
Is this relevant?