The World Wide Web Conference 2019
DOI: 10.1145/3308558.3314143
|View full text |Cite
|
Sign up to set email alerts
|

UNVEIL: Capture and Visualise WiFi Data Leakages

Abstract: In the past few years, numerous privacy vulnerabilities have been discovered in the WiFi standards and their implementations for mobile devices. These vulnerabilities allow an attacker to collect large amounts of data on the device user, which could be used to infer sensitive information such as religion, gender, and sexual orientation. Solutions for these vulnerabilities are often hard to design and typically require many years to be widely adopted, leaving many devices at risk. In this paper, we present UNVE… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Attacks based on Wi-Fi are either passive, where the app simply observes probe requests that mobile phones send to sense nearby Wi-Fi hotspots, or active, running a fake hotspot with a common SSID (e.g., attwifi, xfinitywifi) for nearby phones to connect to. 46 While more complex, the latter bypasses MAC address randomization used by some operating systems, including relatively recent versions of both Android and iOS. 47 , 48 The two main platforms are thus moving toward re-randomization of the MAC address even when connecting to previously known networks.…”
Section: Discussionmentioning
confidence: 99%
“…Attacks based on Wi-Fi are either passive, where the app simply observes probe requests that mobile phones send to sense nearby Wi-Fi hotspots, or active, running a fake hotspot with a common SSID (e.g., attwifi, xfinitywifi) for nearby phones to connect to. 46 While more complex, the latter bypasses MAC address randomization used by some operating systems, including relatively recent versions of both Android and iOS. 47 , 48 The two main platforms are thus moving toward re-randomization of the MAC address even when connecting to previously known networks.…”
Section: Discussionmentioning
confidence: 99%
“…To address this gap, the focus of this study is to provide a comprehensive design of Wi-Fi tracking system that offers a clearer understanding. The study aims to delve into the different components of system in greater detail compared to previous studies [ [18][19][20][21][22][23][24][25][26]. It is expected to make it easier for readers to understand the whole system.…”
Section: Related Workmentioning
confidence: 99%
“…For example, unauthorized individuals can steal information stored in MAC address and use it to identify peoples' location and duration of stay in a building [24]. This raises significant safety and privacy concerns [25]. In this study, TLS/SSL is employed for MQTT communication to ensure secure transmission due to its ability to provide a secure communication channel between the client and server.…”
Section: A Embedded Nodementioning
confidence: 99%
See 1 more Smart Citation
“…In the past 10 years, mobile devices have been growing rapidly at a speed unthought before. The advent of smartphones would not exactly be as great as they are if it were not for the invention of fast and reliable internet broadbands, thus much of the credit goes to Wi-Fi protocols and their improving implementation over the years (Jain et. al, 2019).…”
Section: Introductionmentioning
confidence: 99%