Wireless Security Protocols WPA3: A Systematic Literature Review

A Halbouni, LY Ong, MC Leow - IEEE Access, 2023 - ieeexplore.ieee.org
The size of wireless networks and the number of wireless devices are growing daily. A
crucial part of wireless security involves preventing unauthorized access by using wireless …

“They're not that hard to mitigate”: What cryptographic library developers think about timing attacks

J Jancar, M Fourné, DDA Braga, M Sabt… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Timing attacks are among the most devastating side-channel attacks, allowing remote
attackers to retrieve secret material, including cryptographic keys, with relative ease. In …

A systematic evaluation of automated tools for side-channel vulnerabilities detection in cryptographic libraries

A Geimer, M Vergnolle, F Recoules, LA Daniel… - Proceedings of the …, 2023 - dl.acm.org
To protect cryptographic implementations from side-channel vulnerabilities, developers must
adopt constant-time programming practices. As these can be error-prone, many side …

SoK: Password-Authenticated Key Exchange--Theory, Practice, Standardization and Real-World Lessons

F Hao, PC van Oorschot - Proceedings of the 2022 ACM on Asia …, 2022 - dl.acm.org
Password-authenticated key exchange (PAKE) is a major area of cryptographic protocol
research and practice. Many PAKE proposals have emerged in the 30 years following the …

[PDF][PDF] “These results must be false”: A usability evaluation of constant-time analysis tools

M Fourné, DDA Braga, J Jancar, M Sabt… - 33th USENIX Security …, 2024 - usenix.org
Cryptography secures our online interactions, transactions, and trust. To achieve this goal,
not only do the cryptographic primitives and protocols need to be secure in theory, they also …

Framing Frames: Bypassing {Wi-Fi} Encryption by Manipulating Transmit Queues

D Schepers, A Ranganathan, M Vanhoef - 32nd USENIX Security …, 2023 - usenix.org
Wi-Fi devices routinely queue frames at various layers of the network stack before
transmitting, for instance, when the receiver is in sleep mode. In this work, we investigate …

A time-memory trade-off attack on WPA3's SAE-PK

M Vanhoef - Proceedings of the 9th ACM on ASIA Public-Key …, 2022 - dl.acm.org
To increase the security of Wi-Fi hotspots, the Wi-Fi Alliance released the SAE-PK
(Simultaneous Authentication of Equals-Public Key) protocol in December 2020. In this …

PARASITE: Password recovery attack against SRP implementations in the wild

D de Almeida Braga, PA Fouque, M Sabt - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Protocols for password-based authenticated key exchange (PAKE) allow two users sharing
only a short, low-entropy password to establish a secure session with a cryptographically …

A Security Analysis of WPA3-PK: Implementation and Precomputation Attacks

M Vanhoef, J Robben - … Conference on Applied Cryptography and Network …, 2024 - Springer
Abstract Creating secure Wi-Fi hotspots has historically been challenging: when using an
open network it is trivial for an adversary to eavesdrop traffic. Alternatively, when using a …

ZeroShield: Transparently Mitigating Code Page Sharing Attacks With Zero-Cost Stand-By

M Wang, F Zheng, J Lin, F Jiang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Numerous cache side-channel attack techniques enable attackers to execute a cross-VM
cache side-channel attack through the sharing of code pages with the targeted victim …