메뉴 건너뛰기




Volumn , Issue , 2013, Pages

A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; NETWORK SECURITY; USER INTERFACES;

EID: 85180418432     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (50)

References (53)
  • 2
    • 84874721375 scopus 로고    scopus 로고
    • Aircrack. Aircrack-ng. http://www.aircrack-ng.org/, 2012.
    • (2012) Aircrack-ng
  • 5
    • 85180415005 scopus 로고    scopus 로고
    • BBN Technologies
    • BBN Technologies. 802.11b Transmitter/Receiver. https://www.cgran.org/wiki/BBN80211, 2008.
    • (2008) 802.11b Transmitter/Receiver
  • 10
    • 77953853641 scopus 로고    scopus 로고
    • Shake them up!: a movement-based pairing protocol for cpu-constrained devices
    • C. Castelluccia and P. Mutaf. Shake them up!: a movement-based pairing protocol for cpu-constrained devices. In MobiSys, pages 51-64, 2005.
    • (2005) MobiSys , pp. 51-64
    • Castelluccia, C.1    Mutaf, P.2
  • 12
    • 37749010823 scopus 로고    scopus 로고
    • Cross-layer jamming detection and mitigation in wireless broadcast networks
    • J. Chiang and Y.-C. Hu. Cross-layer jamming detection and mitigation in wireless broadcast networks. In Proceedings of MobiCom, 2007.
    • (2007) Proceedings of MobiCom
    • Chiang, J.1    Hu, Y.-C.2
  • 14
    • 84871954941 scopus 로고    scopus 로고
    • Comodo, Inc
    • Comodo, Inc. Comodo Report of Incident. https://www.comodo.com/Comodo-FraudIncident-2011-03-23.html, 2011.
    • (2011) Comodo Report of Incident
  • 15
    • 33745223821 scopus 로고    scopus 로고
    • Wireless commons perils in the common good
    • February
    • J. Damsgaard, M. A. Parikh, and B. Rao. Wireless commons perils in the common good. Communications of the ACM, 49(2):104-109, February 2006.
    • (2006) Communications of the ACM , vol.49 , Issue.2 , pp. 104-109
    • Damsgaard, J.1    Parikh, M. A.2    Rao, B.3
  • 16
  • 18
  • 20
    • 77958042149 scopus 로고    scopus 로고
    • GNU Radio Project
    • GNU Radio Project. GNU Radio. http://gnuradio. org, 2012.
    • (2012) GNU Radio
  • 26
    • 84970874882 scopus 로고    scopus 로고
    • IEEE. http://standards.ieee.org/about/get/802/802.11.html
    • IEEE. Standards for Wireless, Local, and Metropolitan Area Networks. http://standards.ieee.org/findstds/standard/802.1X-2010.html, http://standards.ieee.org/about/get/802/802.11.html, 2012.
    • (2012) Standards for Wireless, Local, and Metropolitan Area Networks
  • 27
    • 41949126461 scopus 로고    scopus 로고
    • Why and How to Perform Fraud Experiments
    • March-April
    • M. Jakobsson, P. Finn, and N. Johnson. Why and How to Perform Fraud Experiments. Security & Privacy, IEEE, 6(2):66-68, March-April 2008.
    • (2008) Security & Privacy, IEEE , vol.6 , Issue.2 , pp. 66-68
    • Jakobsson, M.1    Finn, P.2    Johnson, N.3
  • 29
    • 77953306472 scopus 로고    scopus 로고
    • Randomized differential dsss: jamming-resistant wireless broadcast communication
    • Piscataway, NJ, USA, IEEE Press
    • Y. Liu, P. Ning, H. Dai, and A. Liu. Randomized differential dsss: jamming-resistant wireless broadcast communication. In Proceedings of the 29th conference on Information communications, pages 695-703, Piscataway, NJ, USA, 2010. IEEE Press.
    • (2010) Proceedings of the 29th conference on Information communications , pp. 695-703
    • Liu, Y.1    Ning, P.2    Dai, H.3    Liu, A.4
  • 30
    • 85180413224 scopus 로고    scopus 로고
    • M. Marlinspike. sslstrip. http://www.thoughtcrime.org/software/sslstrip/, 2012.
    • (2012) sslstrip
    • Marlinspike, M.1
  • 37
    • 85180401326 scopus 로고    scopus 로고
    • Openwall Project
    • Openwall Project. John the Ripper. http://www.openwall.com/john/, 2012.
    • (2012) John the Ripper
  • 38
    • 85180417546 scopus 로고    scopus 로고
    • OpenWRT Project
    • OpenWRT Project. OpenWRT. http://www.openwrt.org.
    • OpenWRT
  • 46
    • 85180405020 scopus 로고    scopus 로고
    • The Shmoo Group. IDN Homograph Attack. http://www.shmoo.com/idn, 2005.
    • (2005) IDN Homograph Attack
  • 52
    • 51849119602 scopus 로고    scopus 로고
    • Defending wireless sensor networks from radio interference through channel adaptation
    • 18: September
    • W. Xu, W. Trappe, and Y. Zhang. Defending wireless sensor networks from radio interference through channel adaptation. ACM Transactions on Sensor Networks, 4:18:1-18:34, September 2008.
    • (2008) ACM Transactions on Sensor Networks , vol.4 , pp. 1-18:34
    • Xu, W.1    Trappe, W.2    Zhang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.