This proof of concept demonstrates how traffic load of a shared packet queue can be exploited as a side channel through which protected information leaks to an off-path attacker.
8ecb66a21b5290308e2faf624032d7d2c77c172dda2d82f1b64ec25123f32521
© 2024 Packet Storm. All rights reserved.