ETGuard: Detecting D2D Attacks using Wireless Evil Twins
暂无分享,去创建一个
[1] Quincy Wu,et al. A Proof of MITM Vulnerability in Public WLANs Guarded by Captive Portal , 2010 .
[2] Sachin Shetty,et al. Rogue Access Point Detection by Analyzing Network Traffic Characteristics , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[3] Sneha Kumar Kasera,et al. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2008, IEEE Transactions on Mobile Computing.
[4] Chao Yang,et al. Active User-Side Evil Twin Access Point Detection Using Statistical Techniques , 2012, IEEE Transactions on Information Forensics and Security.
[5] Edgar R. Weippl,et al. Browser History Stealing with Captive Wi-Fi Portals , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[6] Andriy Panchenko,et al. Hacker's toolbox: Detecting software-based 802.11 evil twin access points , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[7] Thomas Engel,et al. Undesired relatives: protection mechanisms against the evil twin attack in IEEE 802.11 , 2014, Q2SWinet '14.
[8] Yu-Liang Hsu,et al. A client-side detection mechanism for evil twins , 2017, Comput. Electr. Eng..
[9] Rahmat Budiarto,et al. Powering the Internet of Things With 5G Networks , 2017 .
[10] Bernd Freisleben,et al. Why eve and mallory love android: an analysis of android SSL (in)security , 2012, CCS.
[11] Thomas Engel,et al. Letting the puss in boots sweat: detecting fake access points using dependency of clock skews on temperature , 2014, AsiaCCS.
[12] Carlos Ribeiro,et al. WiFiHop - Mitigating the Evil Twin Attack through Multi-hop Detection , 2011, ESORICS.
[13] José Carlos Brustoloni,et al. Detecting and Blocking Unauthorized Access in Wi-Fi Networks , 2004, NETWORKING.
[14] Sergey Bratus,et al. Active behavioral fingerprinting of wireless devices , 2008, WiSec '08.
[15] Christoph Neumann,et al. An Empirical Study of Passive 802.11 Device Fingerprinting , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[16] Xiaojiang Chen,et al. Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes , 2017, Mob. Inf. Syst..
[17] Wenyuan Xu,et al. CETAD: Detecting evil twin access point attacks in wireless hotspots , 2014, 2014 IEEE Conference on Communications and Network Security.
[18] Zhuoqing Morley Mao,et al. Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[19] Frank Piessens,et al. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 , 2017, CCS.