|
[1] Chrome Remote Desktop, accessed on July 10, 2023. [Online]. Available: https://remotedesktop.google.com/access/ [2] TeamViewer, accessed on July 10, 2023. [Online]. Available: https://www.teamviewer.com/ [3] Mircosoft Remote Desktop, accessed on July 10, 2023. [Online]. Available: https://apps.microsoft.com/store/detail/microsoft-%E9%81%A0%E7%AB%AF%E6%A1%8C%E9%9D%A2/9WZDNCRFJ3PS?hl=zh-tw&gl=tw&rtc=1 [4] RealVNC, accessed on July 10, 2023. [Online]. Available: https://www.realvnc.com/ [5] TigerVNC, accessed on July 10, 2023. [Online]. Available: https://tigervnc.org/ [6] Extended Berkeley Packet Filter (eBPF), accessed on June 20, 2023. [Online]. Available: https://ebpf.io/ [7] tc(8) - Linux man page, accessed on June 20, 2023. [Online]. Available: https://man7.org/linux/manpages/man8/tc.8.html [8] Programming Protocol-independent Packet Processors (P4), accessed on June 20, 2023. [Online]. Available: https://p4.org/ [9] R. Bitton, C. Feher, Y. Elovici, A. Shabtai, G. Shugol, R. Tikochinski, and S. Kur, “A proxy-based solution for securiting remote desktop connections in mission-critical systems,” in 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), 2017, pp. 153–156. [10] J.-s. He, C. Xu, Y.-x. Zhang, and S.-y. Zhou, “A strategy for middleman attack prevention in remote desktop protocol,” Journal of Shanghai Jiaotong University (Science), vol. 20, no. 1, p. 82–85, 2015. [11] W. Cui, H. Li, W. Li, and S. An, “The design and implementation of remote desktop access audit system,” in 2012 7th International Conference on Computing and Convergence Technology (ICCCT), 2012, pp. 1239–1243. [12] J. Rouzaud-Cornabas and N. Viot, “Secured architecture for remote virtual desktops,” in 2007 International Symposium on Collaborative Technologies and Systems, 2007, pp. 80–87. [13] R. Bitton and A. Shabtai, “A machine learning-based intrusion detection system for securing remote desktop connections to electronic flight bag servers,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1164–1181, 2021. [14] Z. Wang, X. Wu, C. Liu, Q. Liu, and J. Zhang, “Ransomtracer: Exploiting cyber deception for ransomware tracing,” in 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), 2018, pp. 227–234. [15] T.-H. Lee, H.-C. Lee, J.-H. Kim, and M.-J. Lee, “Extending vnc for effective collaboration,” in 2008 Third International Forum on Strategic Technologies, 2008, pp. 343–346. [16] Y. Kraev, G. Firsov, and D. Kandakov, “Authentication via rdp using electronic identifiers,” in 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), 2021, pp. 2361–2365. [17] Understanding remote desktop protocol, accessed on June 20, 2023. [Online]. Available: https://learn.microsoft.com/zh-tw/troubleshoot/windows-server/remote/understanding-remote-desktop-protocol [18] T. Richardson and J. R. Levine, “The Remote Framebuffer Protocol,” RFC 6143, Mar. 2011. [Online]. Available: https://www.rfc-editor.org/info/rfc6143 [19] eXpress Data Path (XDP), accessed on June 20, 2023. [Online]. Available: https://prototype-kernel.readthedocs.io/en/latest/networking/XDP/ [20] tc-mirred(8) —Linux manual page, accessed on July 10, 2023. [Online]. Available: https://man7.org/linux/man-pages/man8/tc-mirred.8.html [21] Intel 82599ES, accessed on July 23, 2023. [Online]. Available: https://www.intel.com.tw/content/www/tw/zh/products/sku/41282/intel-82599es-10-gigabit-ethernet-controller/specifications.html [22] TigerVNC source code, accessed on July 23, 2023. [Online]. Available: https://github.com/TigerVNC/tigervnc [23] Clumsy, accessed on July 23, 2023. [Online]. Available: https://github.com/jagt/clumsy [24] Inventec D10056, accessed on July 10, 2023. [Online]. Available: https://productline.inventec.com/switch/D10056.aspx [25] Tofino 1, accessed on July 23, 2023. [Online]. Available: https://www.intel.com.tw/content/www/tw/zh/products/sku/218656/intel-tofino-2-0-tbps-2-pipelines/specifications.html
|