메뉴 건너뛰기




Volumn , Issue , 2012, Pages 918-926

A formal analysis of IEEE 802.11w deadlock vulnerabilities

Author keywords

[No Author keywords available]

Indexed keywords

802.11W; DENIAL OF SERVICE; EXPERIMENTAL VALIDATIONS; FORMAL ANALYSIS; FORMAL MODEL; MODEL CONSTRUCTION; ROBUST PROTOCOL; SIMPLE PROTOCOL; SOURCE CODES; THEORY AND PRACTICE; VERIFICATION AND VALIDATION;

EID: 84861639032     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2012.6195841     Document Type: Conference Paper
Times cited : (25)

References (22)
  • 1
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • Berkeley, CA, USA: USENIX Association
    • J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proceedings of the 12th USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2003.
    • (2003) Proceedings of the 12th USENIX Security Symposium
    • Bellardo, J.1    Savage, S.2
  • 2
    • 68849088469 scopus 로고    scopus 로고
    • Fragility of the robust security network: 802.11 denial of service
    • Proceedings of the 7th International Conference on Applied Cryptography and Network Security, ser. Springer-Verlag
    • M. Eian, "Fragility of the robust security network: 802.11 denial of service," in Proceedings of the 7th International Conference on Applied Cryptography and Network Security, ser. Lecture Notes in Computer Science, vol. 5536. Springer-Verlag, 2009, pp. 400-416.
    • (2009) Lecture Notes in Computer Science , vol.5536 , pp. 400-416
    • Eian, M.1
  • 3
    • 78651098416 scopus 로고    scopus 로고
    • A practical cryptographic denial of service attack against 802.11i TKIP and CCMP
    • Proceedings of the Ninth International Conference on Cryptology And Network Security, ser. Springer-Verlag
    • -, "A practical cryptographic denial of service attack against 802.11i TKIP and CCMP," in Proceedings of the Ninth International Conference on Cryptology And Network Security, ser. Lecture Notes in Computer Science, vol. 6467. Springer-Verlag, 2010, pp. 62-75.
    • (2010) Lecture Notes in Computer Science , vol.6467 , pp. 62-75
    • Eian, M.1
  • 6
    • 70350650693 scopus 로고    scopus 로고
    • Signaling-oriented DoS attacks in UMTS networks
    • Advances in Information Security and Assurance, ser. Springer-Verlag
    • G. Kambourakis, C. Kolias, S. Gritzalis, and J. Hyuk-Park, "Signaling-oriented DoS attacks in UMTS networks," in Advances in Information Security and Assurance, ser. Lecture Notes in Computer Science. Springer-Verlag, 2009, vol. 5576, pp. 280-289.
    • (2009) Lecture Notes in Computer Science , vol.5576 , pp. 280-289
    • Kambourakis, G.1    Kolias, C.2    Gritzalis, S.3    Hyuk-Park, J.4
  • 10
    • 80051903947 scopus 로고    scopus 로고
    • Short paper: Security evaluation of IEEE 802.11w specification
    • Proceedings of the fourth ACM conference on Wireless network security, ser. New York, NY, USA: ACM
    • M. S. Ahmad and S. Tadakamadla, "Short paper: security evaluation of IEEE 802.11w specification," in Proceedings of the fourth ACM conference on Wireless network security, ser. WiSec '11. New York, NY, USA: ACM, 2011, pp. 53-58.
    • (2011) WiSec '11 , pp. 53-58
    • Ahmad, M.S.1    Tadakamadla, S.2
  • 11
    • 0032664157 scopus 로고    scopus 로고
    • A formal framework and evaluation method for network denial of service
    • 00
    • C. Meadows, "A formal framework and evaluation method for network denial of service," IEEE Computer Security Foundations Workshop, vol. 00, p. 4, 1999.
    • (1999) IEEE Computer Security Foundations Workshop , pp. 4
    • Meadows, C.1
  • 12
    • 45749110240 scopus 로고    scopus 로고
    • Analysis of EAP-GPSK authentication protocol
    • Proceedings of the 6th International Conference on Applied Cryptography and Network Security, ser. Springer-Verlag
    • J. Mitchell, A. Roy, P. Rowe, and A. Scedrov, "Analysis of EAP-GPSK authentication protocol," in Proceedings of the 6th International Conference on Applied Cryptography and Network Security, ser. Lecture Notes in Computer Science, vol. 5037. Springer-Verlag, 2008, pp. 309-327.
    • (2008) Lecture Notes in Computer Science , vol.5037 , pp. 309-327
    • Mitchell, J.1    Roy, A.2    Rowe, P.3    Scedrov, A.4
  • 17
    • 81055155451 scopus 로고    scopus 로고
    • The modeling and comparison of wireless network denial of service attacks
    • Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and Applications on Mobile Handhelds, ser. New York, NY, USA: ACM
    • M. Eian and S. F. Mjølsnes, "The modeling and comparison of wireless network denial of service attacks," in Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and Applications on Mobile Handhelds, ser. MobiHeld '11. New York, NY, USA: ACM, 2011, pp. 7:1-7:6.
    • (2011) MobiHeld '11
    • Eian, M.1    Mjølsnes, S.F.2
  • 18
    • 18944390941 scopus 로고    scopus 로고
    • The model checker SPIN
    • May
    • G. J. Holzmann, "The model checker SPIN," IEEE Trans. Softw. Eng., vol. 23, pp. 279-295, May 1997.
    • (1997) IEEE Trans. Softw. Eng. , vol.23 , pp. 279-295
    • Holzmann, G.J.1
  • 21
    • 84861652013 scopus 로고    scopus 로고
    • The OpenWrt Project, "OpenWrt," 2011, http://www.openwrt.org.
    • (2011) OpenWrt


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.