2022
DOI: 10.3390/cryptography6040053
|View full text |Cite
|
Sign up to set email alerts
|

WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations

Abstract: This work attempts to provide a way of scrutinizing the security robustness of Wi-Fi implementations in an automated fashion. To this end, to our knowledge, we contribute the first full-featured and extensible Wi-Fi fuzzer. At the time of writing, the tool, made publicly available as open source, covers the IEEE 802.11 management and control frame types and provides a separate module for the pair of messages of the Simultaneous Authentication of Equals (SAE) authentication and key exchange method. It can be pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 11 publications
0
1
0
Order By: Relevance
“…It utilizes messages exchanged between the hub and IoT devices to discover all functions automatically and then initiates a feature-oriented message-semantics-guided fuzz test. In the latest WiFi-security-related works [16][17][18][19], wireless access points (APs) are taken as a research entry point to review the security of actual device WiFi networks, especially the security of web interfaces related to access points (APs).…”
Section: Dynamic Analysis-based Approachesmentioning
confidence: 99%
“…It utilizes messages exchanged between the hub and IoT devices to discover all functions automatically and then initiates a feature-oriented message-semantics-guided fuzz test. In the latest WiFi-security-related works [16][17][18][19], wireless access points (APs) are taken as a research entry point to review the security of actual device WiFi networks, especially the security of web interfaces related to access points (APs).…”
Section: Dynamic Analysis-based Approachesmentioning
confidence: 99%
“…Based on the degree of understanding of the target program, fuzzers can be classified as black-box [23], grey-box [24], and white-box [25], with each technique being sequential, having more information available that can be leveraged for the analysis of the test target. Otherwise, fuzzers can also be classified, based on the type of input they create, into mutation based [26], generation based [12,27], and hybrid [28]. The first category mutates existing inputs to create new inputs, while the second generates new inputs from scratch from a specification, often based on a specific grammar.…”
Section: Fuzzingmentioning
confidence: 99%
“…Network protocol fuzzing: Fuzzing often involves the security testing of communication protocols [10][11][12]. For instance, in PropFuzz [13], the authors present a protocol fuzzer designed for proprietary ICS protocols.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation