10th IEEE High Assurance Systems Engineering Symposium (HASE'07) 2007
DOI: 10.1109/hase.2007.43
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities

Abstract: Wireless LANs (WLAN) are becoming ubiquitous, as more and more consumer electronic equipments start to support them. This creates new security concerns, since hackers no longer need physical connection to the networks linking the devices, but only need to be in their proximity, to send malicious data to exploit some vulnerability. In this paper we present a fuzzer, called Wdev-Fuzzer, which can be utilized to locate security vulnerabilities in Wi-Fi device drivers. Our experiments with a Windows Mobile 5 devic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…To find bugs and vulnerabilities in operating systems, some fuzzing approaches [3], [5]- [7], [11], [36]- [38] target kernellevel programs. For example, syzkaller [3] is a well-known kernel fuzzing tool developed and maintained by Google.…”
Section: Related Work a Fuzzingmentioning
confidence: 99%
“…To find bugs and vulnerabilities in operating systems, some fuzzing approaches [3], [5]- [7], [11], [36]- [38] target kernellevel programs. For example, syzkaller [3] is a well-known kernel fuzzing tool developed and maintained by Google.…”
Section: Related Work a Fuzzingmentioning
confidence: 99%
“…Wi-Fi drivers have been tested for vulnerabilities, but only with as goal to detect general errors such as buffer overflows and NULL pointer dereferences [22,7]. Moreover, they only tested how implementations handle unprotected management frames.…”
Section: Related Workmentioning
confidence: 99%
“…Existing work on analyzing device-driver interactions typically runs the entire system including device drivers in a controlled environment [32], [44], [47], [49], [54], [60], [62], [66], such as QEMU [20] or S2E [33]. Enabling analysis in such an environment often requires developer efforts tailored to specific drivers or devices, e.g., implementing a virtual device or annotating driver code to keep symbolic execution tractable.…”
Section: Introductionmentioning
confidence: 99%