Vis enkel innførsel

dc.contributor.authorKampourakis, Vyron
dc.contributor.authorChatzoglou, Efstratios
dc.contributor.authorKambourakis, Georgios
dc.contributor.authorDolmes, Apostolos
dc.contributor.authorZaroliagis, Christos
dc.date.accessioned2023-02-10T09:28:23Z
dc.date.available2023-02-10T09:28:23Z
dc.date.created2023-01-06T10:54:12Z
dc.date.issued2022
dc.identifier.citationCryptography. 2022, 6 (4), .en_US
dc.identifier.issn2410-387X
dc.identifier.urihttps://hdl.handle.net/11250/3049928
dc.description.abstractThis work attempts to provide a way of scrutinizing the security robustness of Wi-Fi implementations in an automated fashion. To this end, to our knowledge, we contribute the first full-featured and extensible Wi-Fi fuzzer. At the time of writing, the tool, made publicly available as open source, covers the IEEE 802.11 management and control frame types and provides a separate module for the pair of messages of the Simultaneous Authentication of Equals (SAE) authentication and key exchange method. It can be primarily used to detect vulnerabilities potentially existing in wireless Access Points (AP) under the newest Wi-Fi Protected Access 3 (WPA3) certification, but its functionalities can also be exploited against WPA2-compatible APs. Moreover, the fuzzer incorporates: (a) a dual-mode network monitoring module that monitors, in real time, the behavior of the connected AP stations and logs possible service or connection disruptions and (b) an attack tool used to verify any glitches found and automatically craft the corresponding exploit. We present results after testing the fuzzer against an assortment of off-the-shelf APs by different renowned vendors. Adhering to a coordinated disclosure process, we have reported the discovered issues to the affected vendors, already receiving positive feedback from some of them.en_US
dc.language.isoengen_US
dc.publisherMDPIen_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleWPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations †en_US
dc.title.alternativeWPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations †en_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.source.volume6en_US
dc.source.journalCryptographyen_US
dc.source.issue4en_US
dc.identifier.doi10.3390/cryptography6040053
dc.identifier.cristin2101873
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal