Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Replay attack

Known as: Playback attack, Freshness, Freshness (cryptography) 
A replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
The ASVspoof initiative was created to promote the development of countermeasures which aim to protect automatic speaker… Expand
  • table 1
  • table 2
  • figure 1
  • table 4
  • table 3
Highly Cited
2013
Highly Cited
2013
The existing tradeoff between control system performance and the detection rate for replay attacks highlights the need to provide… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2011
Highly Cited
2011
In this paper, we describe a system for detecting spoofing attacks on speaker verification systems. We understand as spoofing the… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 7
  • figure 6
Highly Cited
2009
Highly Cited
2009
  • Yilin Mo, B. Sinopoli
  • 47th Annual Allerton Conference on Communication…
  • 2009
  • Corpus ID: 11668209
This paper analyzes the effect of replay attacks on a control system. We assume an attacker wishes to disrupt the operation of a… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2002
Highly Cited
2002
Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Highly Cited
2002
Highly Cited
2002
Abstract : Replay attacks on security protocols have been discussed for quite some time in the literature. However, the efforts… Expand
Highly Cited
1997
Highly Cited
1997
Gaph Teory Fourth Edition Th is standard textbook of modern graph theory, now in its fourth edition, combines the authority of a… Expand
Highly Cited
1995
Highly Cited
1995
Exchange market mayhem The antecedents and aftermath of speculative attacks This paper evaluates the causes and consequences of… Expand
  • table I
  • table II
  • figure 1
  • figure 2
  • figure 3
Highly Cited
1994
Highly Cited
1994
  • P. Syverson
  • Proceedings The Computer Security Foundations…
  • 1994
  • Corpus ID: 5555422
This paper presents a taxonomy of replay attacks on cryptographic protocols in terms of message origin and destination. The… Expand
Highly Cited
1994
Highly Cited
1994
Abstract : This paper presents a taxonomy of replay attacks on cryptographic protocols in terms of message origin and destination… Expand