1 code implementation • 8 Nov 2022 • Daniel Romero, Peter Gerstoft, Hadi Givehchian, Dinesh Bharadia
In a spoofing attack, an attacker impersonates a legitimate user to access or tamper with data intended for or produced by the legitimate user.