We show that low-layer attacks against WiFi can be implemented using user-modifiable firmware. Hence cheap off-the-shelf WiFi dongles can be used carry out advanced attacks. We demonstrate this by implementing five low-layer attacks using open source Atheros firmware. The first attack consists of unfair channel usage, giving the user a higher throughput while reducing that of others. The second attack defeats countermeasures designed to prevent unfair channel usage. The third attack performs continuous jamming, making the channel unusable for other devices. For the fourth attack we implemented a selective jammer, allowing one to jam specific frames already in the air. The fifth is a novel channel-based Man-in-the-Middle (MitM) attack, enabl...
Abstract—Network communication using unprotected air as a medium leads to unique challenges ensuring...
Abstract—Network communication using unprotected air as a medium leads to unique challenges ensuring...
© 2018 Copyright held by the owner/author(s). Publication rights licensed to the Association for Com...
We show that low-layer attacks against WiFi can be implemented using user-modifiable firmware. Hence...
This dissertation analyzes the security of popular network protocols. First we investigate the Wi-Fi...
The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are ...
The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are ...
We describe three attacks on the Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA-TKIP). ...
Wireless networks, especially those based on 802.11, have found widespread use in domestic, commerci...
In this paper we investigate the resiliency to jamming of data protocols, such as IP, over Wireless ...
In this paper, we propose two new falsification attacks against Wi-Fi Protected Access Temporal Key ...
In this paper, we propose two new falsification attacks against Wi-Fi Protected Access Temporal Key ...
In our society, Wi-Fi devices increase at an exponential rate. Users are increasingly in need of wir...
In this paper, new attacks against TKIP based IEEE 802.11 networks are described. Using the known Be...
In this paper, we propose two new falsification attacks against Wi-Fi Protected Access Temporal Key ...
Abstract—Network communication using unprotected air as a medium leads to unique challenges ensuring...
Abstract—Network communication using unprotected air as a medium leads to unique challenges ensuring...
© 2018 Copyright held by the owner/author(s). Publication rights licensed to the Association for Com...
We show that low-layer attacks against WiFi can be implemented using user-modifiable firmware. Hence...
This dissertation analyzes the security of popular network protocols. First we investigate the Wi-Fi...
The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are ...
The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are ...
We describe three attacks on the Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA-TKIP). ...
Wireless networks, especially those based on 802.11, have found widespread use in domestic, commerci...
In this paper we investigate the resiliency to jamming of data protocols, such as IP, over Wireless ...
In this paper, we propose two new falsification attacks against Wi-Fi Protected Access Temporal Key ...
In this paper, we propose two new falsification attacks against Wi-Fi Protected Access Temporal Key ...
In our society, Wi-Fi devices increase at an exponential rate. Users are increasingly in need of wir...
In this paper, new attacks against TKIP based IEEE 802.11 networks are described. Using the known Be...
In this paper, we propose two new falsification attacks against Wi-Fi Protected Access Temporal Key ...
Abstract—Network communication using unprotected air as a medium leads to unique challenges ensuring...
Abstract—Network communication using unprotected air as a medium leads to unique challenges ensuring...
© 2018 Copyright held by the owner/author(s). Publication rights licensed to the Association for Com...