Attacks on the Network Synchronization Systems Counteraction Method Implemented in the Software and Hardware Device «MARSH! 3.0»
This paper proposes attacks on the network synchronization systems counteraction technique, method, algorithm and realizable aspects. The network synchronization systems are included in information technology systems or networks. This method is implemented in software and hardware device (means) «MA...
Main Authors: | Dmitry Anatolevich Melnikov, Vladislav Romanovich Petrov, Evgeny Vasilevich Dirienko, Anton Anatolevich Abramov, Ivan Alexandrovich Korsakov, Stanislav Sergeevich Kuzminov |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2013-12-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/304 |
Similar Items
-
Computer Network’s Time (Synchronization) Systems Espionage and Its Possible Consequences
by: Dmitry Anatolevich Melnikov, et al.
Published: (2013-12-01) -
Information Technology Systems Vulnerabilities Detecting based on Network’s Traffic Analysis
by: Dmitry Anatolevich Melnikov, et al.
Published: (2013-12-01) -
Analysis of Compromising Emanations from a Laser Printer Printing Head for the Purpose of Assess the Possibility of Information Interception
by: Aleksandr Anatolevich Golyakov, et al.
Published: (2015-10-01) -
Where To Go at the Next Timestamp
by: Jiaqi Duan, et al.
Published: (2024-01-01) -
Empire state /
by: Porter, Henry
Published: (2003)