![WPA2の脆弱性「KRACKs」、Wi-Fi通信での盗聴や内容の改ざんが可能 -INTERNET Watch](https://cdn-ak-scissors.b.st-hatena.com/image/square/b298a752f05a0250df014d9739bad45af1c1878f/height=288;version=1;width=512/https%3A%2F%2Finternet.watch.impress.co.jp%2Fimg%2Fiw%2Flist%2F1086%2F486%2Fkracks1.png)
This is quite a large and substantial refactor of two core modules, ActiveModel::AttributeMethods and ActiveRecord::AttributeMethods. The inspiration for this PR is this blog post on the module builder pattern which I wrote a few months ago (the end of the post discusses a change to AM::AttributeMethods which is almost the same to the one here). I had intended only to change ActiveModel, but the t
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 Mathy Vanhoef imec-DistriNet, KU Leuven Mathy.Vanhoef@cs.kuleuven.be Frank Piessens imec-DistriNet, KU Leuven Frank.Piessens@cs.kuleuven.be ABSTRACT We introduce the key reinstallation attack. This attack abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key’s associated param
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く