메뉴 건너뛰기




Volumn , Issue , 2013, Pages 427-435

Practical verification of WPA-TKIP vulnerabilities

Author keywords

802.11; decryption; dos; driver vulnerabilities; fragmentation; tkip; wpa

Indexed keywords

802.11; DECRYPTION; DRIVER VULNERABILITIES; FRAGMENTATION; TKIP; WPA;

EID: 84877990236     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2484313.2484368     Document Type: Conference Paper
Times cited : (25)

References (22)
  • 1
    • 84864376709 scopus 로고    scopus 로고
    • Retrieved 4 Februari, 2013, from
    • M. Beck. Enhanced TKIP michael attacks. Retrieved 4 Februari, 2013, from http://download.aircrack-ng.org/wiki-files/doc/enhanced-tkip-michael.pdf.
    • Enhanced TKIP Michael Attacks
    • Beck, M.1
  • 5
    • 38849204787 scopus 로고    scopus 로고
    • Discovering and exploiting 802.11 wireless driver vulnerabilities
    • DOI 10.1007/s11416-007-0065-x, SSTIC 2007 Special Issue
    • L. Butti and J. Tinnés. Discovering and exploiting 802.11 wireless driver vulnerabilities. Journal in Computer Virology, 4(1):25-37, 2008. (Pubitemid 351207806)
    • (2008) Journal in Computer Virology , vol.4 , Issue.1 , pp. 25-37
    • Butti, L.1    Tinnes, J.2
  • 12
    • 0032645074 scopus 로고    scopus 로고
    • Review: TCP/IP security threats and attack methods
    • B. Harris and R. Hunt. Review: TCP/IP security threats and attack methods. Computer Communications, 22(10):885-897, 1999.
    • (1999) Computer Communications , vol.22 , Issue.10 , pp. 885-897
    • Harris, B.1    Hunt, R.2
  • 13
    • 33744936311 scopus 로고    scopus 로고
    • Security analysis of michael: The IEEE 802.11i message integrity code
    • J. Huang, J. Seberry, W. Susilo, and M. W. Bunder. Security analysis of michael: The IEEE 802.11i message integrity code. In EUC Workshops, pages 423-432, 2005.
    • (2005) EUC Workshops , pp. 423-432
    • Huang, J.1    Seberry, J.2    Susilo, W.3    Bunder, M.W.4
  • 15
    • 77951273497 scopus 로고    scopus 로고
    • Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard
    • B. Könings, F. Schaub, F. Kargl, and S. Dietzel. Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard. In LCN, 2009.
    • (2009) LCN
    • Könings, B.1    Schaub, F.2    Kargl, F.3    Dietzel, S.4
  • 17
    • 80155124131 scopus 로고    scopus 로고
    • Cryptanalysis for RC4 and breaking WEP/WPA-TKIP
    • M. Morii and Y. Todo. Cryptanalysis for RC4 and breaking WEP/WPA-TKIP. IEICE Transactions, 94-D(11), 2011.
    • (2011) IEICE Transactions , vol.94 D , Issue.11
    • Morii, M.1    Todo, Y.2
  • 19
    • 3142552643 scopus 로고    scopus 로고
    • A key recovery attack on the 802.11b wired equivalent privacy protocol (wep)
    • A. Stubblefield, J. Ioannidis, and A. D. Rubin. A key recovery attack on the 802.11b wired equivalent privacy protocol (wep). ACM Trans. Inf. Syst. Secur., 7(2), 2004.
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , Issue.2
    • Stubblefield, A.1    Ioannidis, J.2    Rubin, A.D.3
  • 21
    • 84856367072 scopus 로고    scopus 로고
    • Falsification attacks against WPA-TKIP in a realistic environment
    • Y. Todo, Y. Ozawa, T. Ohigashi, and M. Morii. Falsification attacks against WPA-TKIP in a realistic environment. IEICE Transactions, 95-D(2), 2012.
    • (2012) IEICE Transactions , vol.95 D , Issue.2
    • Todo, Y.1    Ozawa, Y.2    Ohigashi, T.3    Morii, M.4
  • 22
    • 7544239419 scopus 로고    scopus 로고
    • A note on the fragility of the Michael message integrity code
    • A. Wool. A note on the fragility of the Michael message integrity code. IEEE Transactions on Wireless Communications, 3(5):1459-1462, 2004.
    • (2004) IEEE Transactions on Wireless Communications , vol.3 , Issue.5 , pp. 1459-1462
    • Wool, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.