{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:04:22Z","timestamp":1766484262823,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,11]]},"DOI":"10.1109\/isdfs58141.2023.10131787","type":"proceedings-article","created":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T17:30:36Z","timestamp":1685122236000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Cross Protocol Attack on IPSec-based VPN"],"prefix":"10.1109","author":[{"given":"Amaldeep","family":"S","sequence":"first","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Centre for Cybersecurity Systems and Networks,Amritapuri,India"}]},{"given":"Sriram","family":"Sankaran","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Centre for Cybersecurity Systems and Networks,Amritapuri,India"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4301"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4303"},{"key":"ref14","article-title":"Guide to ipsec vpns","author":"barker","year":"2019","journal-title":"Technical Report National Institute of Standards and Technology"},{"journal-title":"Libres","article-title":"LibreSwan Project","year":"2012","key":"ref20"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICA50127.2020.9182437"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT50939.2020.9295700"},{"key":"ref2","first-page":"1","article-title":"and Ashish Kumar Puranik. Avoidance of replay attack in can protocol using authenticated encryption","author":"chandrasekaran","year":"2020","journal-title":"2020 11th International Conference on Computing Communication and Networking Technologies (ICCCNT)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-5529-6_22"},{"key":"ref17","article-title":"Internet Key Exchange Protocol Version 2 (IKEv2)","author":"kivinen","year":"2014","journal-title":"RFC 7296"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4302"},{"journal-title":"StrongSwan","article-title":"StrongSwan Project","year":"2005","key":"ref19"},{"journal-title":"FreeS\/WAN Project","year":"0","key":"ref18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510216"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387465"},{"key":"ref9","first-page":"567","article-title":"The dangers of key reuse: Practical attacks on ipsec ike","author":"felsch","year":"2018","journal-title":"USENIX Security Symposium"},{"key":"ref4","first-page":"4293","article-title":"Alpaca: Application layer protocol confusion-analyzing and mitigating cracks in tls authentication","author":"brinkmann","year":"2021","journal-title":"USENIX Security Symposium"},{"key":"ref3","volume":"383","author":"kumar","year":"2021","journal-title":"Ubiquitous Communications and Network Computing 4th EAI International Conference UBICNET 2021 Virtual Event March 2021 Proceedings"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055716"},{"key":"ref5","first-page":"689","article-title":"{DROWN}: Breaking {TLS} using sslv2","author":"aviram","year":"2016","journal-title":"25th USENIX Security Symposium ( USENIX Security 16)"}],"event":{"name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","start":{"date-parts":[[2023,5,11]]},"location":"Chattanooga, TN, USA","end":{"date-parts":[[2023,5,12]]}},"container-title":["2023 11th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10131120\/10131673\/10131787.pdf?arnumber=10131787","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T17:56:08Z","timestamp":1686592568000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10131787\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,11]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/isdfs58141.2023.10131787","relation":{},"subject":[],"published":{"date-parts":[[2023,5,11]]}}}