{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:36:17Z","timestamp":1762004177397,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,31]],"date-time":"2009-03-31T00:00:00Z","timestamp":1238457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,31]]},"DOI":"10.1145\/1519144.1519146","type":"proceedings-article","created":{"date-parts":[[2009,4,6]],"date-time":"2009-04-06T16:34:53Z","timestamp":1239035693000},"page":"9-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Application-based TCP hijacking"],"prefix":"10.1145","author":[{"given":"Oliver","family":"Zheng","sequence":"first","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]},{"given":"Jason","family":"Poon","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]},{"given":"Konstantin","family":"Beznosov","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]}],"member":"320","published-online":{"date-parts":[[2009,3,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AOL's Third Annual Instant Messager Trends Survey. Available at aim.com\/survey.  AOL's Third Annual Instant Messager Trends Survey. Available at aim.com\/survey."},{"key":"e_1_3_2_1_2_1","unstructured":"MSN Messenger Encryption and Security Software. Available at secway.fr\/us\/products\/simplitemsn\/home.php.  MSN Messenger Encryption and Security Software. Available at secway.fr\/us\/products\/simplitemsn\/home.php."},{"key":"e_1_3_2_1_3_1","unstructured":"Pidgin the Universal IM Client. Available at pidgin.im.  Pidgin the Universal IM Client. Available at pidgin.im."},{"key":"e_1_3_2_1_4_1","unstructured":"Unofficial MSN Protocol Documentation June 2007. Available at msnpiki.msnfanatic.com\/index.php.  Unofficial MSN Protocol Documentation June 2007. Available at msnpiki.msnfanatic.com\/index.php."},{"key":"e_1_3_2_1_5_1","unstructured":"Windows Live Messenger Ads Reach Millions of Consumers 2008. Available at advertising.microsoft.com\/windows-live-messenger.  Windows Live Messenger Ads Reach Millions of Consumers 2008. Available at advertising.microsoft.com\/windows-live-messenger."},{"volume-title":"Inc.","year":"2004","author":"Dubrawsky I.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"T. Fout. Inside Windows Messenger - How It Communicates October 2001. Available at technet.microsoft.com\/en-us\/library\/bb457041.aspx.  T. Fout. Inside Windows Messenger - How It Communicates October 2001. Available at technet.microsoft.com\/en-us\/library\/bb457041.aspx."},{"volume-title":"Syngress","year":"2006","author":"Gregg M.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"B. Harris and R. Hunt. TCP\/IP Security Threats and Attack Methods. Computer Communications 22(10):885--897 June 1991.  B. Harris and R. Hunt. TCP\/IP Security Threats and Attack Methods. Computer Communications 22(10):885--897 June 1991.","DOI":"10.1016\/S0140-3664(99)00064-X"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267591.1267593"},{"key":"e_1_3_2_1_11_1","unstructured":"K. Lam D. LeBlanc and B. Smith. Theft on the Web: Prevent Session Hijacking 2005. Available at technet.microsoft.com\/en-us\/magazine\/cc160809.aspx.  K. Lam D. LeBlanc and B. Smith. Theft on the Web: Prevent Session Hijacking 2005. Available at technet.microsoft.com\/en-us\/magazine\/cc160809.aspx."},{"key":"e_1_3_2_1_12_1","unstructured":"M. Mintz and A. Sayers. MSN Messenger Protocol December 2003. Available at hypothetic.org\/docs\/msn\/index.php.  M. Mintz and A. Sayers. MSN Messenger Protocol December 2003. Available at hypothetic.org\/docs\/msn\/index.php."},{"volume-title":"Syngress","year":"2005","author":"Piccard P.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","unstructured":"J. Postel. Transmission Control Protocol. RFC 793 (Standard) September 1981. Updated by RFCs 1122 3168. Available at ietf.org\/rfc\/rfc793.txt.  J. Postel. Transmission Control Protocol. RFC 793 (Standard) September 1981. Updated by RFCs 1122 3168. Available at ietf.org\/rfc\/rfc793.txt."},{"key":"e_1_3_2_1_15_1","unstructured":"R. Spangler. Packet Sniffing on Layer 2 Switched Local Area Networks December 2003. Available at packetwatch.net\/documents\/papers\/layer2sniffing.pdf.  R. Spangler. Packet Sniffing on Layer 2 Switched Local Area Networks December 2003. Available at packetwatch.net\/documents\/papers\/layer2sniffing.pdf."},{"volume-title":"Wiley-Interscience","year":"2005","author":"Stamp M.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194882"},{"key":"e_1_3_2_1_18_1","unstructured":"C. Torre. Windows Live Messenger - What. How. Why. Available at channel9.msdn.com\/Showpost.aspx?postid=215459.  C. Torre. Windows Live Messenger - What. How. Why. Available at channel9.msdn.com\/Showpost.aspx?postid=215459."},{"key":"e_1_3_2_1_19_1","unstructured":"R. Y. Zaghal and J. I. Khan. EFSM\/SDL modeling of the original TCP standard (RFC793) and the Congestion Control Mechanism of TCP Reno. Available at http:\/\/www.medianet.kent.edu\/techreports\/TR2005-07-22-tcp-EFSM.pdf.  R. Y. Zaghal and J. I. Khan. EFSM\/SDL modeling of the original TCP standard (RFC793) and the Congestion Control Mechanism of TCP Reno. Available at http:\/\/www.medianet.kent.edu\/techreports\/TR2005-07-22-tcp-EFSM.pdf."}],"event":{"name":"EuroSys '09: Fourth EuroSys Conference 2009","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Nuremburg Germany","acronym":"EuroSys '09"},"container-title":["Proceedings of the Second European Workshop on System Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1519144.1519146","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1519144.1519146","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:54Z","timestamp":1750253394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1519144.1519146"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,31]]},"references-count":19,"alternative-id":["10.1145\/1519144.1519146","10.1145\/1519144"],"URL":"https:\/\/doi.org\/10.1145\/1519144.1519146","relation":{},"subject":[],"published":{"date-parts":[[2009,3,31]]},"assertion":[{"value":"2009-03-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}