Publication detail

Malware injection in wireless networks

KAČIC, M. HENZL, M. JURNEČKA, P. HANÁČEK, P.

Original Title

Malware injection in wireless networks

Type

article in a collection out of WoS and Scopus

Language

English

Original Abstract

Nowadays we use the 802.11i standard, which is considered safe for now. In 2010, the Hole 196 vulnerability of Group Transient Key was discovered, which allows an undetectable insider ARP poisoning attack. On this ground we have founded the possibility of malware injection into wireless communication with purpose of avoiding intrusion detection system. This paper describes creation and injection of valid 802.11i frames with malware payload. We alsodiscuss its impact on users at home and wide corporate wireless network.

Keywords

Wireless network security, Malware injection,Group key vulnerability

Authors

KAČIC, M.; HENZL, M.; JURNEČKA, P.; HANÁČEK, P.

RIV year

2013

Released

14. 9. 2013

Publisher

Institute of Electrical and Electronics Engineers

Location

Berlin

ISBN

978-1-4799-1426-5

Book

Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS)

Edition

Volume 1

Pages from

483

Pages to

487

Pages count

5

URL

BibTex

@inproceedings{BUT103455,
  author="Matej {Kačic} and Martin {Henzl} and Peter {Jurnečka} and Petr {Hanáček}",
  title="Malware injection in wireless networks",
  booktitle="Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS)",
  year="2013",
  series="Volume 1",
  pages="483--487",
  publisher="Institute of Electrical and Electronics Engineers",
  address="Berlin",
  isbn="978-1-4799-1426-5",
  url="https://www.fit.vut.cz/research/publication/10254/"
}

Documents