Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing

被引:9
|
作者
Vanhoef, Mathy [1 ]
Schepers, Domien [1 ]
Piessens, Frank [1 ]
机构
[1] Katholieke Univ Leuven, Imec DistriNet, Leuven, Belgium
关键词
802.11; Wi-Fi; handshake; testing; fuzzing;
D O I
10.1145/3052973.3053008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We use model-based testing techniques to detect logical vulnerabilities in implementations of the Wi-Fi handshake. This reveals new fingerprinting techniques, multiple downgrade attacks, and Denial of Service (DoS) vulnerabilities. Stations use the Wi-Fi handshake to securely connect with wireless networks. In this handshake, mutually supported capabilities are determined, and fresh pairwise keys are negotiated. As a result, a proper implementation of the Wi-Fi handshake is essential in protecting all subsequent traffic. To detect the presence of erroneous behaviour, we propose a model-based technique that generates a set of representative test cases. These tests cover all states of the Wi-Fi handshake, and explore various edge cases in each state. We then treat the implementation under test as a black box, and execute all generated tests. Determining whether a failed test introduces a security weakness is done manually. We tested 12 implementations using this approach, and discovered irregularities in all of them. Our findings include fingerprinting mechanisms, DoS attacks, and downgrade attacks where an adversary can force usage of the insecure WPA-TKIP cipher. Finally, we explain how one of our downgrade attacks highlights incorrect claims made in the 802.11 standard.
引用
收藏
页码:360 / 371
页数:12
相关论文
共 50 条
  • [1] Wi-Fi Handshake: analysis of password patterns in Wi-Fi networks
    Carballal, Adrian
    Galego-Carro, J. Pablo
    Rodriguez- Fernandez, Nereida
    Fernandez-Lozano, Carlos
    [J]. PEERJ COMPUTER SCIENCE, 2022, 8
  • [2] Wi-Fi Handshake: analysis of password patterns in Wi-Fi networks
    Carballal A.
    Galego-Carro J.P.
    Rodriguez-Fernandez N.
    Fernandez-Lozano C.
    [J]. PeerJ Computer Science, 2022, 8
  • [3] Spatial Interpolation of Wi-Fi RSS Fingerprints using model-based universal Kriging
    Kram, Sebastian
    Nickel, Christian
    Seitz, Jochen
    Patino-Studencka, Lucila
    Thielecke, Joern
    [J]. 2017 SENSOR DATA FUSION: TRENDS, SOLUTIONS, APPLICATIONS (SDF), 2017,
  • [4] Practical Studying of Wi-Fi Network Vulnerabilities
    Ismukhamedova, Aigerim
    Satimova, Yelena
    Nikiforov, Andrei
    Miloslavskaya, Natalia
    [J]. 2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 227 - 232
  • [5] Embedded BeagleBone Based Wi-Fi Intrusions Detector and Vulnerabilities Checker
    Benadda, Belkacem
    Elgorma, Mourad
    Beldjilali, Bilal
    [J]. 2017 SEMINAR ON DETECTION SYSTEMS ARCHITECTURES AND TECHNOLOGIES (DAT), 2017,
  • [6] A Self-Adaptive Model-Based Wi-Fi Indoor Localization Method
    Tuta, Jure
    Juric, Matjaz B.
    [J]. SENSORS, 2016, 16 (12):
  • [7] Fuzzing Wi-Fi drivers to locate security vulnerabilities
    Mendonca, Manuel
    Neves, Nuno Ferreira
    [J]. HASE 2007: 10TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2007, : 379 - 380
  • [8] Fuzzing Wi-Fi drivers to locate security vulnerabilities
    Mendonca, Manuel
    Neves, Nuno
    [J]. EDCC-7: SEVENTH EUROPEAN DEPENDABLE COMPUTING CONFERENCE, PROCEEDINGS, 2008, : 110 - 119
  • [9] Augmented Wi-Fi: An AI-based Wi-Fi Management Framework for Wi-Fi/LTE Coexistence
    Soto, Paola
    Camelo, Miguel
    Fontaine, Jaron
    Girmay, Merkebu
    Shahid, Adnan
    Maglogiannis, Vasilis
    De Poorter, Eli
    Moerman, Ingrid
    Botero, Juan F.
    Latre, Steven
    [J]. 2020 16TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2020,
  • [10] WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations
    Kampourakis, Vyron
    Chatzoglou, Efstratios
    Kambourakis, Georgios
    Dolmes, Apostolos
    Zaroliagis, Christos
    [J]. CRYPTOGRAPHY, 2022, 6 (04)