Replay attack

Known as: Freshness, Playback attack, Repeat attack 
A replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1985-2018
05010019852018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Replay, which is to playback a pre-recorded speech sample, presents a genuine risk to automatic speaker verification technology… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
2013
2013
The existing tradeoff between control system performance and the detection rate for replay attacks highlights the need to provide… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
Recent years, several techniques have been proposed to preserve the user location privacy in road networks. Some of the existing… (More)
  • figure 1
  • table 1
  • figure 3
Is this relevant?
2011
2011
In this paper, we present a framework to combat replay attack (RA) in a speaker verification (SV) system. Although the problem of… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
This paper analyzes the effect of replay attacks on a control system. We assume an attacker wishes to disrupt the operation of a… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2009
2009
Digital Rights Management (DRM), unlike access control techniques, associates content with a rights object specifying content… (More)
  • figure 1
  • figure 2
Is this relevant?
2008
2008
Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications on the Internet. In… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2008
2008
The paper presents an original, independent of typical cryptographic techniques, method of biometric replay attack prevention for… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 5
Is this relevant?
2005
2005
We prove the existence of a flaw which we individuated in the design of the object-independent authorization protocol (OIAP… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
1994
Highly Cited
1994
This paper presents a taxonomy of replay attacks on cryptographic protocols in terms of message origin and destination. The… (More)
Is this relevant?