User Tools

Site Tools


links

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
links [2017/06/24 18:56]
mister_x Moved some papers from one section to another and added a new paper.
links [2017/11/09 21:12] (current)
mister_x [Additional Papers] Added link to KRACK github repo
Line 50: Line 50:
   * [[https://​www.rc4nomore.com/​vanhoef-usenix2015.pdf|All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS]] by Mathy Vanhoef and Frank Piessens, Katholieke Universiteit Leuven. Slides can be found [[https://​www.usenix.org/​sites/​default/​files/​conference/​protected-files/​sec15_slides_vanhoef.pdf|here]] and the video of the presentation [[https://​www.usenix.org/​node/​190889|here]].   * [[https://​www.rc4nomore.com/​vanhoef-usenix2015.pdf|All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS]] by Mathy Vanhoef and Frank Piessens, Katholieke Universiteit Leuven. Slides can be found [[https://​www.usenix.org/​sites/​default/​files/​conference/​protected-files/​sec15_slides_vanhoef.pdf|here]] and the video of the presentation [[https://​www.usenix.org/​node/​190889|here]].
   * [[https://​forums.kali.org/​showthread.php?​24286-WPS-Pixie-Dust-Attack-(Offline-WPS-Attack)|Pixie dust attack]] on WPS. Presentation available [[http://​archive.hack.lu/​2014/​Hacklu2014_offline_bruteforce_attack_on_wps.pdf|here]]. And they have a [[http://​www.github.com/​wiire/​pixiewps|GitHub repository]].   * [[https://​forums.kali.org/​showthread.php?​24286-WPS-Pixie-Dust-Attack-(Offline-WPS-Attack)|Pixie dust attack]] on WPS. Presentation available [[http://​archive.hack.lu/​2014/​Hacklu2014_offline_bruteforce_attack_on_wps.pdf|here]]. And they have a [[http://​www.github.com/​wiire/​pixiewps|GitHub repository]].
-  * [[http://​www.slideshare.net/​vanhoefm/​predicting-and-abusing-wpa280211-group-keys|Predicting and Abusing WPA2/802.11 Group Keys]] by Mathy Vanhoef ([[http://​papers.mathyvanhoef.com/​33c3-broadkey-slides.pdf|PDF]])+  * [[http://​www.slideshare.net/​vanhoefm/​predicting-and-abusing-wpa280211-group-keys|Predicting and Abusing WPA2/802.11 Group Keys]] by Mathy Vanhoef ([[http://​papers.mathyvanhoef.com/​33c3-broadkey-slides.pdf|PDF]] and [[https://​github.com/​vanhoefm/​broadkey|code]])
   * [[https://​www.petsymposium.org/​2017/​papers/​issue4/​paper82-2017-4-source.pdf|A Study of MAC Address Randomization in Mobile Devices and When it Fails]] by Jeremy Martin, Travis Mayberry, Collin Donahue, Lucas Foppe, Lamont Brown, Chadwick Riggins, Erik C. Rye, and Dane Brown   * [[https://​www.petsymposium.org/​2017/​papers/​issue4/​paper82-2017-4-source.pdf|A Study of MAC Address Randomization in Mobile Devices and When it Fails]] by Jeremy Martin, Travis Mayberry, Collin Donahue, Lucas Foppe, Lamont Brown, Chadwick Riggins, Erik C. Rye, and Dane Brown
 +  * [[http://​papers.mathyvanhoef.com/​asiaccs2016.pdf|Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms]],​ Mathy Vanhoef, C. Matte, M. Cunche, L. S. Cardoso, and F. Piessens 
 +  * [[http://​papers.mathyvanhoef.com/​wisec2016.pdf|Defeating MAC Address Randomization Through Timing Attacks]], C. Matte, M. Cunche, F. Rousseau, and Mathy Vanhoef 
 +  * [[http://​papers.mathyvanhoef.com/​phdthesis.pdf|A Security Analysis of the WPA-TKIP and TLS Security Protocols]],​ Mathy Vanhoef 
 +  * [[https://​lirias.kuleuven.be/​bitstream/​123456789/​572634/​1/​asiaccs2017.pdf|Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing]], Mathy Vanhoef, D. Schepers, and F. Piessens 
 +  * [[http://​papers.mathyvanhoef.com/​blackhat2017.pdf|WiFuzz:​ Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake]],​ Mathy Vanhoef 
 +  * [[https://​papers.mathyvanhoef.com/​ccs2017.pdf|Key Reinstallation AttACK]], Mathy Vanhoef, Frank Piessens ([[https://​papers.mathyvanhoef.com/​ccs2017-slides.pdf|Slides]]). [[https://​github.com/​vanhoefm/​krackattacks-scripts|GitHub repository]] with scripts to test if client or AP are vulnerable.
 ===== 802.11 Specifications ==== ===== 802.11 Specifications ====
  
links.1498323408.txt.gz · Last modified: 2017/06/24 18:56 by mister_x