Attacking automatic wireless network selection

A., Zovi, Shane A. Macaulay
{"title":"Attacking automatic wireless network selection","authors":"A., Zovi, Shane A. Macaulay","doi":"10.1109/IAW.2005.1495975","DOIUrl":null,"url":null,"abstract":"Wireless 802.11 networking is becoming so prevalent that many users have become accustomed to having available wireless networks in their workplace, home, and many public places such as airports and coffee shops. Modern client operating systems implement automatic wireless network discovery and known network identification to facilitate wireless networking for the end-user. In order to implement known network discovery, client operating systems remember past wireless networks that have been joined and automatically look for these networks (referred to as preferred or trusted networks) whenever the wireless network adapter is enabled. By examining these implementations in detail, we have discovered previously undisclosed vulnerabilities in the implementation of these algorithms under the two most prevalent client operating systems, Windows XP and MacOS X. With custom base station software, an attacker may cause clients within wireless radio range to associate to the attacker's wireless network without user interaction or notification. This occurs even if the user has never connected to a wireless network before or they have an empty preferred/trusted networks list. We describe these vulnerabilities as well as their implementation and impact.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"37","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAW.2005.1495975","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 37

Abstract

Wireless 802.11 networking is becoming so prevalent that many users have become accustomed to having available wireless networks in their workplace, home, and many public places such as airports and coffee shops. Modern client operating systems implement automatic wireless network discovery and known network identification to facilitate wireless networking for the end-user. In order to implement known network discovery, client operating systems remember past wireless networks that have been joined and automatically look for these networks (referred to as preferred or trusted networks) whenever the wireless network adapter is enabled. By examining these implementations in detail, we have discovered previously undisclosed vulnerabilities in the implementation of these algorithms under the two most prevalent client operating systems, Windows XP and MacOS X. With custom base station software, an attacker may cause clients within wireless radio range to associate to the attacker's wireless network without user interaction or notification. This occurs even if the user has never connected to a wireless network before or they have an empty preferred/trusted networks list. We describe these vulnerabilities as well as their implementation and impact.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
攻击无线网络自动选择
无线802.11网络变得如此普遍,以至于许多用户已经习惯在他们的工作场所、家庭和许多公共场所(如机场和咖啡馆)拥有可用的无线网络。现代客户端操作系统实现自动无线网络发现和已知网络识别,以方便最终用户的无线网络。为了实现已知网络发现,客户机操作系统会记住过去已加入的无线网络,并在启用无线网络适配器时自动查找这些网络(称为首选网络或可信网络)。通过详细检查这些实现,我们发现了在两种最流行的客户端操作系统(Windows XP和MacOS x)下实现这些算法时以前未公开的漏洞。使用自定义基站软件,攻击者可能会导致无线无线电范围内的客户端在没有用户交互或通知的情况下关联到攻击者的无线网络。即使用户以前从未连接到无线网络,或者他们的首选/可信网络列表为空,也会发生这种情况。我们将描述这些漏洞以及它们的实现和影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Safe renewal of a random key pre-distribution scheme for trusted devices Visualization techniques for intrusion behavior identification An e-mail honeypot addressing spammers' behavior in collecting and applying addresses Application of zeta function to quantum cryptography Reverse code engineering: an in-depth analysis of the Bagle virus
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1