The article focuses heavily on why existing solutions are bad, but doesn’t seem to propose novel detection techniques - or at least glosses a bit over the details of the detection algorithm.
Would the approach be able to detect an AdaptOver/LTrack style attack?
The article focuses heavily on why existing solutions are bad, but doesn’t seem to propose novel detection techniques - or at least glosses a bit over the details of the detection algorithm.
Would the approach be able to detect an AdaptOver/LTrack style attack?