A multi-processor NoC platform applied on the 802.11i TKIP cryptosystem
Proceedings of the 2008 Asia and South Pacific Design Automation Conference
Proximity breeds danger: emerging threats in metro-area wireless networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Security and privacy system architecture for an e-hospital environment
Proceedings of the 7th symposium on Identity and trust on the Internet
A proactive wireless self-protection system
Proceedings of the 5th international conference on Pervasive services
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Computer Communications
Extending orchids for intrusion detection in 802.11 wireless networks
NOTERE '08 Proceedings of the 8th international conference on New technologies in distributed systems
Improving wireless security through network diversity
ACM SIGCOMM Computer Communication Review
Practical attacks against WEP and WPA
Proceedings of the second ACM conference on Wireless network security
Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Fragility of the Robust Security Network: 802.11 Denial of Service
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Proceedings of the 2008 workshop on New security paradigms
Fast track article: Bringing law and order to IEEE 802.11 networks-A case for DiscoSec
Pervasive and Mobile Computing
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Robust Detection of Unauthorized Wireless Access Points
Mobile Networks and Applications
Automating the injection of believable decoys to detect snooping
Proceedings of the third ACM conference on Wireless network security
Passive-only key recovery attacks on RC4
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Breaking 104 Bit WEP in less than 60 seconds
WISA'07 Proceedings of the 8th international conference on Information security applications
Analyzing uncertainty in TG protection graphs with TG/MC
Journal of Computer Security
SecureAngle: improving wireless security using angle-of-arrival information (poster abstract)
Proceedings of the ACM SIGCOMM 2010 conference
SecureAngle: improving wireless security using angle-of-arrival information
Hotnets-IX Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks
The case for ubiquitous transport-level encryption
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Goal-oriented security threat mitigation patterns: a case of credit card theft mitigation
Proceedings of the 16th Conference on Pattern Languages of Programs
Practical verification of WPA-TKIP vulnerabilities
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
SecureArray: improving wifi security with fine-grained physical-layer information
Proceedings of the 19th annual international conference on Mobile computing & networking
A system for generating and injecting indistinguishable network decoys
Journal of Computer Security
Hi-index | 0.00 |
The 802.11 encryption standard Wired Equivalent Privacy (WEP) is still widely used today despite the numerous discussions on its insecurity. In this paper, we present a novel vulnerability which allows an attacker to send arbitrary data on a WEP network after having eavesdropped a single data packet. Furthermore, we present techniques for real-time decryption of data packets, which may be used under common circumstances. Vendor produced mitigation techniques which cause frequent WEP re-keying prevent traditional attacks, whereas our attack remains effective even in such scenarios. We implemented a fully automatic version of this attack which demonstrates its practicality and feasibility in real networks. As even rapidly re-keyed networks can be quickly compromised, we believe WEP must now be abandoned rather than patched yet again.