Result Details
Malware injection in wireless networks
KAČIC, M.; HENZL, M.; JURNEČKA, P.; HANÁČEK, P. Malware injection in wireless networks. Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). Volume 1. Berlin: Institute of Electrical and Electronics Engineers, 2013. p. 483-487. ISBN: 978-1-4799-1426-5.
Type
conference paper
Language
English
Authors
Kačic Matej, Ing., Ph.D., DITS (FIT)
Henzl Martin, Ing. Mgr., Ph.D., DITS (FIT)
Jurnečka Peter, Ing., Ph.D., DITS (FIT)
Hanáček Petr, doc. Dr. Ing., DITS (FIT)
Henzl Martin, Ing. Mgr., Ph.D., DITS (FIT)
Jurnečka Peter, Ing., Ph.D., DITS (FIT)
Hanáček Petr, doc. Dr. Ing., DITS (FIT)
Abstract
Nowadays we use the 802.11i standard, which is considered safe for now. In 2010, the Hole 196 vulnerability of Group Transient Key was discovered, which allows an undetectable insider ARP poisoning attack. On this ground we have founded the possibility of malware injection into wireless communication with purpose of avoiding intrusion detection system. This paper describes creation and injection of valid 802.11i frames with malware payload. We also
discuss its impact on users at home and wide corporate wireless network.
Keywords
Wireless network security, Malware injection,
Group key vulnerability
Published
2013
Pages
483–487
Proceedings
Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS)
Series
Volume 1
Conference
Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 2013
ISBN
978-1-4799-1426-5
Publisher
Institute of Electrical and Electronics Engineers
Place
Berlin
BibTeX
@inproceedings{BUT103455,
author="Matej {Kačic} and Martin {Henzl} and Peter {Jurnečka} and Petr {Hanáček}",
title="Malware injection in wireless networks",
booktitle="Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS)",
year="2013",
series="Volume 1",
pages="483--487",
publisher="Institute of Electrical and Electronics Engineers",
address="Berlin",
isbn="978-1-4799-1426-5",
url="https://www.fit.vut.cz/research/publication/10254/"
}
Files
Projects
Advanced secured, reliable and adaptive IT, BUT, Vnitřní projekty VUT, FIT-S-11-1, start: 2011-01-01, end: 2013-12-31, completed
Centrum excelence IT4Innovations, MŠMT, Operační program Výzkum a vývoj pro inovace, ED1.1.00/02.0070, start: 2011-01-01, end: 2015-12-31, completed
Security-Oriented Research in Information Technology, MŠMT, Institucionální prostředky SR ČR (např. VZ, VC), MSM0021630528, start: 2007-01-01, end: 2013-12-31, running
Centrum excelence IT4Innovations, MŠMT, Operační program Výzkum a vývoj pro inovace, ED1.1.00/02.0070, start: 2011-01-01, end: 2015-12-31, completed
Security-Oriented Research in Information Technology, MŠMT, Institucionální prostředky SR ČR (např. VZ, VC), MSM0021630528, start: 2007-01-01, end: 2013-12-31, running
Research groups
IT Security Research Group (RG Security@FIT)
Departments