hijacking

(redirected from Replay attack)
Also found in: Thesaurus, Medical, Legal, Financial, Encyclopedia, Wikipedia.

hi·jack

also high·jack (hī′jăk′)
tr.v. hi·jacked, hi·jack·ing, hi·jacks also high·jacked or high·jack·ing or high·jacks
1.
a. To seize control of (a vehicle such as an airplane or bus) by use of force, especially as a way of reaching an alternate destination or as an act of terrorism.
b. To kidnap (a person in a vehicle): people who have experienced the trauma of being hijacked.
c. To stop and rob (a vehicle in transit).
d. To steal (goods) from a vehicle in transit.
2.
a. To take control of (something) without permission or authorization and use it for one's own purposes: dissidents who hijacked the town council; spammers who hijacked a computer network.
b. To steal or appropriate for oneself: hijacked her story and used it in his own book.
n.
The act or an instance of hijacking.

[Probably back-formation from highjacker, perhaps from jacker, holdup man, from jack, to jacklight.]

hi′jack′er n.

hijacking

or

highjacking

n
the act or an instance of hijacking
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.hijacking - robbery of a traveller or vehicle in transit or seizing control of a vehicle by the use of forcehijacking - robbery of a traveller or vehicle in transit or seizing control of a vehicle by the use of force
robbery - larceny by threat of violence
buccaneering, piracy - hijacking on the high seas or in similar contexts; taking a ship or plane away from the control of those who are legally entitled to it; "air piracy"
Translations

hijacking

[ˈhaɪdʒækɪŋ] Nsecuestro m (fig) → apropiación f

hijacking

[ˈhaɪdʒækɪŋ] n [plane] → détournement m; [train] → attaque f
car hijackings → vols mpl de voitures avec violence

hijacking

[ˈhaɪˌdʒækɪŋ] npirateria aerea; (incident) → dirottamento
References in periodicals archive ?
Resistance to various attacks: It ensures that various attacks should be prevented in MCC services, such as replay attack, man-in-the-middle attack, privileged insider attack and stole-verifier attack.
In addition to expanding on VoiceVault's digits or passphrases and liveness and replay attack detection, the new system asks for random types of speech syntax to authenticate users so they can't memorize responses and try multiple times to crack the system using the same phraseology.
The user's secret therefore never leaves their device, making impersonation through a replay attack impossible.
The proposed mechanism has different advantages such as it provides the resist against replay attack, man-in-the-middle attack and it has less time complexity.
Various Authentication Protocols based on the Minimalist Cryptography and its characteristics [74] Protocol Resistant Against Attacks U-MAP Forward Secrecy, Anonymity U-LAP Forward Secrecy, Anonymity, Replay Attack, Forgery, man in middle attack E-MAP Forward Secrecy, Anonymity, Replay Attack, Forgery, Forgery Resistant LMAP Forward Secrecy, Anonymity, Replay Attack, Forgery, Data Recovery SASI Forward Secrecy, Anonymity HBVI Anonymity, Replay Attack, Forgery, Forward Secrecy, Data Recovery SA Replay, Attack, Anonymity, Confidentiality Gossamer Desynchronization, disclosure, Forward Secrecy, Anonymity, Forward Secrecy, Anonymity Table 8.
Additionally, we developed Merkle hash tree by making a user's query to work one-time which leads to prevent an adversary from applying his malicious attacks such as Man-in-the-Middle (MITM) attack, insider attack, and replay attack.
However SEAD successfully handles replay attack, it is unable to cope up with wormhole attack [14] by a malicious node acting as a repeater and replaying the message from an unauthenticated node.
Tripathy and Nandi [5] adopt a dynamic ID to avoid replay attack but it may suffer Dos attack.
It is claimed that the scheme resists lost smart card attacks, offline password guessing attack, lost ticket attack, masquerade attack and replay attack.
2]AM satisfies the security requirement by creating a session key, such as replay attack resistance, stolen-verifier attack resistance and mutual authentication to prevent server spoofing attack.
user name and password, compromised or stolen by eliminating the feasibility of any replay attack.
Since the output from the card emulator is identical to that of the real card from which it was skimmed, a simple replay attack using this device would succeed.