Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security 2017
DOI: 10.1145/3052973.3053008
|View full text |Cite
|
Sign up to set email alerts
|

Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing

Abstract: We use model-based testing techniques to detect logical vulnerabilities in implementations of the Wi-Fi handshake. This reveals new fingerprinting techniques, multiple downgrade attacks, and Denial of Service (DoS) vulnerabilities. Stations use the Wi-Fi handshake to securely connect with wireless networks. In this handshake, mutually supported capabilities are determined, and fresh pairwise keys are negotiated. As a result, a proper implementation of the Wi-Fi handshake is essential in protecting all subseque… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(16 citation statements)
references
References 23 publications
0
10
0
Order By: Relevance
“…The usage of TKIP is being discouraged by the Wi-Fi Alliance [7], however, WPA2 certified devices are still allowed to support both TKIP and CCMP. Several vulnerabilities have been found in WPA2 implementations [28,35], and more recently we have seen key reinstallation attacks (KRACKs) against the WPA2 standard itself [33,34].…”
Section: Historymentioning
confidence: 99%
See 2 more Smart Citations
“…The usage of TKIP is being discouraged by the Wi-Fi Alliance [7], however, WPA2 certified devices are still allowed to support both TKIP and CCMP. Several vulnerabilities have been found in WPA2 implementations [28,35], and more recently we have seen key reinstallation attacks (KRACKs) against the WPA2 standard itself [33,34].…”
Section: Historymentioning
confidence: 99%
“…It has been shown that MediaTek devices may be vulnerable to a downgrade attack from AES-CCMP to WPA-TKIP [35]. As a result, clients using AES-CCMP may be downgraded to WPA-TKIP and fall victim to our attack.…”
Section: Mediatek Fragmentation Oraclementioning
confidence: 99%
See 1 more Smart Citation
“…ACM ISBN 978-1-4503-8349-3/21/06. https://doi.org/10.1145/3448300.3468261 modeled the four-way handshake to identify weaknesses [7,11], inspected the impact of Wi-Fi Protected Setup (WPS) flaws [4], and proposed numerous methods to enhance the security of Wi-Fi networks, for example, by presenting an extensive formal analysis of the WPA2 protocol design [2]. In their experiments, researchers are often required to implement complex features or entire procedures from scratch (e.g., using Python and Scapy).…”
Section: Introductionmentioning
confidence: 99%
“…The nature of wireless network transmission and the emerging attacks are continuously creating or exploiting more vulnerability [3]. Despite the fact that the security mechanism and protocols are upgraded and enhanced, some companies or organization environments cannot afford a separate authentication system, and generally adopt the Wi-Fi-Protected-Access/Preshared-key(WPA2-PSK) which is not assuring 100 % security and are still exposed to some categories of attacks such as downgrade attacks, de-authentication attacks and DoS, that aims to push wireless clients to re-authenticate to Access point( AP) and try to capture the key exchanged during the handshake to compromise the network security [4].…”
Section: Introcutionmentioning
confidence: 99%