Zeroconf Protocols and Their Numerous Man in the Middle Attacks
Offered By: IEEE via YouTube
Course Description
Overview
Explore the vulnerabilities of Zeroconf protocols and their susceptibility to man-in-the-middle attacks in this 15-minute IEEE conference talk presented at the 15th IEEE Workshop on Offensive Technologies. Gain insights from authors Marc Dacier and Dhia Farrah of EURECOM as they delve into the security implications of zero-configuration networking protocols and discuss potential attack vectors that cybersecurity professionals should be aware of.
Syllabus
[WOOT2021] Zeroconf protocols and their numerous man in the middle attacks
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity