Exploiting sshd1 with logarithmic complexity

Kalle Lyytikäinen, Pekka Korpinen, Teemupekka Virtanen

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Original languageEnglish
    Title of host publication3rd Australian Information Warfare & Security Conference 2002
    EditorsWilliam Hutchinson
    Place of PublicationAustralia
    Pages117-124
    Publication statusPublished - 2002
    MoE publication typeA4 Article in a conference publication

    Keywords

    • buffer overflow
    • exploit
    • ssh
    • sshd1

    Cite this