A survey of protocol fuzzing

X Zhang, C Zhang, X Li, Z Du, B Mao, Y Li… - ACM Computing …, 2024 - dl.acm.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

On the robustness of Wi-Fi deauthentication countermeasures

D Schepers, A Ranganathan, M Vanhoef - Proceedings of the 15th ACM …, 2022 - dl.acm.org
With the introduction of WPA3 and Wi-Fi 6, an increased usage of Wi-Fi Management Frame
Protection (MFP) is expected. Wi-Fi MFP, defined in IEEE 802.11 w, protects robust …

Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation

FT Chimuco, JBF Sequeiros, CG Lopes… - International Journal of …, 2023 - Springer
The adoption and popularization of mobile devices, such as smartphones and tablets,
accentuated after the second decade of this century, has been motivated by the growing …

Exploring Wi-Fi WPA2 KRACK vulnerability: A review paper

M Alhamry, W Elmedany - … on Data Analytics for Business and …, 2022 - ieeexplore.ieee.org
Wi-Fi networks are preferred by many businesses and organizations since they save money
on wiring and give staff more flexibility. organizations and people are becoming more …

Cut It: Deauthentication attacks on protected management frames in WPA2 and WPA3

K Lounis, SHH Ding, M Zulkernine - … on foundations and practice of security, 2021 - Springer
Abstract Deauthentication attacks on Wi-Fi protocol (IEEE 802.11) were pointed out in early
2003. In these attacks, an attacker usually impersonates a Wi-Fi access point (aka …

Systematically analyzing vulnerabilities in the connection establishment phase of Wi-Fi systems

N Hoque, H Rahbari… - 2022 IEEE Conference on …, 2022 - ieeexplore.ieee.org
To establish a secure Wi-Fi connection, several un-protected management frames are
exchanged between an access point and a station before they mutually authenticate each …

Testing and improving the correctness of Wi-Fi frame injection

M Vanhoef, X Jiao, W Liu, I Moerman - … of the 16th ACM Conference on …, 2023 - dl.acm.org
Investigating the security of Wi-Fi devices often requires writing scripts that send unexpected
or malformed frames, to subsequently monitor how the devices respond. Such tests …

A signature-based wireless intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks

M Thankappan, H Rifà-Pous, C Garrigues - IEEE Access, 2024 - ieeexplore.ieee.org
One of the advanced Man-in-the-Middle (MitM) attacks is the Multi-Channel MitM (MC-MitM)
attack, which is capable of manipulating encrypted wireless frames between clients and the …

Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode

Z Shen, I Karim, E Bertino - Proceedings of the 19th ACM Asia …, 2024 - dl.acm.org
The IEEE 802.11 family of standards, better known as WiFi, is a widely used protocol utilized
by billions of users. Previous works on WiFi formal verification have mostly focused on the …

A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks

M Thankappan, H Rifà-Pous, C Garrigues - International Journal of …, 2024 - Springer
Abstract A Multi-Channel Man-in-the-Middle (MC-MitM) attack is an advanced form of MitM
attack, characterized by its ability to manipulate encrypted wireless communications …