Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search
Exploiting cross-layer vulnerabilities: off-path attacks on the TCP/IP protocol suite
Feng X., Li Q., Sun K., Xu K., Wu J. Communications of the ACM68 (3):48-59,2025.Type:Article
Date Reviewed: Jun 11 2025

The transmission control protocol/Internet protocol (TCP/IP) suite has been the backbone of the Internet since the 1970s. This suite of protocols operates in five distinct layers; however, the Internet control message protocol (ICMP) in the Internet layer--and used for reporting errors and management queries--can induce cross-layer interactions within the TCP/IP stack, exposing vulnerabilities that can be used by attackers.

Feng et al. discuss how these interactions are vulnerable to off-path attacks. They discuss issues such as information leakage, the manipulation of IP packet IDs to establish side channels for the injection of fake TCP packets, resetting encrypted transport layer security (TLS) connections (effectively, a denial-of-service attack), and the manipulation of the path maximum transmission unit discovery (PMTUD) process to inject fake TCP fragments in order to poison TCP connections.

Findings also cover common Wi-Fi access point router limitations based on their network processing unit (NPU) being unable to verify the authenticity of Wi-Fi packets, making them vulnerable to identity deception and unable to block forged ICMP redirects. The authors also describe their experimental survey of Internet websites, discovering that a large number were vulnerable to DoS attacks through the semantic-gap vulnerability in the ICMP error message’s legitimacy check mechanism.

Feng et al. suggest countermeasures and include their conclusions and thorough references. The article is an interesting investigation into an important area of Internet security that deserves continued work.

Reviewer:  David B. Henderson Review #: CR147963
Bookmark and Share
  Reviewer Selected
Editor Recommended
Featured Reviewer
 
 
TCP/ IP (C.2.2 ... )
 
 
Security and Protection (C.2.0 ... )
 
Would you recommend this review?
yes
no
Other reviews under "TCP/IP": Date
Critical path analysis of TCP transactions
Barford P., Crovella M.  Data communication in Latin America and the Caribbean (, San Jose, Costa Rica, Apr 3-5, 2001)80-102, 2001. Type: Proceedings
Jun 6 2002
The simple book
Rose M. (ed), Prentice-Hall, Inc., Upper Saddle River, NJ, 1991. Type: Book (9780138126117)
May 1 1992
TCP/IP and related protocols
Black U., McGraw-Hill, Inc., New York, NY, 1992. Type: Book (9780070055537)
Feb 1 1993
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2025 ThinkLoud®
Terms of Use
| Privacy Policy