2018
DOI: 10.1007/978-3-319-99073-6_16
|View full text |Cite
|
Sign up to set email alerts
|

Extending Automated Protocol State Learning for the 802.11 4-Way Handshake

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
1
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(6 citation statements)
references
References 25 publications
0
1
0
Order By: Relevance
“…The automaton has a state that encapsulates a 4-way handshake mechanism granting access to the controlled port. Since learning the 4-way handshake mechanisms is already addressed in [22], we focus on learning the AKM service. We used the following management frames: Auth(Open), AssoReq, Deauth(leaving), Disas(leaving), ProbeReq, and timeout [14, p. 45-49].…”
Section: Android Authentication and Key Managementmentioning
confidence: 99%
“…The automaton has a state that encapsulates a 4-way handshake mechanism granting access to the controlled port. Since learning the 4-way handshake mechanisms is already addressed in [22], we focus on learning the AKM service. We used the following management frames: Auth(Open), AssoReq, Deauth(leaving), Disas(leaving), ProbeReq, and timeout [14, p. 45-49].…”
Section: Android Authentication and Key Managementmentioning
confidence: 99%
“…These attacks can be launched by anyone within range of the victim, and nowadays low-cost Wi-Fi "deauthers" are readily available for less than $10 [31]. Disconnecting a client from the network is an essential step towards successfully executing many attacks, in particular those targeting the connection process, with example attacks being [3,6,7,16,23,24,39]. For instance, offline dictionary attacks against the passphrase of a WPA2 network require the adversary to capture a client's 4-way handshake, and can be accelerated by capturing additional handshakes.…”
Section: Introductionmentioning
confidence: 99%
“…The usage of TKIP is being discouraged by the Wi-Fi Alliance [60], however, WPA2 certified devices are still allowed to support both TKIP and CCMP. Several vulnerabilities have been found in WPA2 implementations [18,61], and more recently we have seen key reinstallation attacks (KRACKs) against the WPA2 standard itself [1,62].…”
Section: Historymentioning
confidence: 99%
“…In addition, researchers identified vulnerabilities in technology surrounding Wi-Fi, such as Wi-Fi Protected Setup (WPS) [80,39]. In [81], message forging attacks against AES-CCMP were described, and several WPA2 implementations have been analyzed in works such as [18,61] revealing how clients may be downgraded from AES-CCMP to WPA-TKIP. Downgrading clients to WPA-TKIP makes them vulnerable to the attacks devised against it.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation