Advanced Wi-Fi attacks using commodity hardware
@inproceedings{Vanhoef2014AdvancedWA, title={Advanced Wi-Fi attacks using commodity hardware}, author={Mathy Vanhoef and F. Piessens}, booktitle={ACSAC '14}, year={2014} }
We show that low-layer attacks against Wi-Fi can be implemented using user-modifiable firmware. Hence cheap off-the-shelf Wi-Fi dongles can be used carry out advanced attacks. We demonstrate this by implementing five low-layer attacks using open source Atheros firmware. The first attack consists of unfair channel usage, giving the user a higher throughput while reducing that of others. The second attack defeats countermeasures designed to prevent unfair channel usage. The third attack performs… CONTINUE READING
Figures, Tables, and Topics from this paper
72 Citations
Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks
- Computer Science
- WISEC
- 2018
- 10
- PDF
Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing
- Computer Science
- AsiaCCS
- 2017
- 12
- PDF
Characterizing Wi-Fi Man-In-the-Middle Attacks
- Computer Science
- 2020 XXXIIIrd General Assembly and Scientific Symposium of the International Union of Radio Science
- 2020
- PDF
Scan-Based Self Anomaly Detection: Client-Side Mitigation of Channel-Based Man-in-the-Middle Attacks Against Wi-Fi
- Computer Science
- 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)
- 2020
PHYAlert: identity spoofing attack detection and prevention for a wireless edge network
- Computer Science
- Journal of Cloud Computing
- 2020
- 2
Dragonblood: A Security Analysis of WPA3's SAE Handshake
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2019
- 12
- PDF