Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing
Mathy Vanhoef, Domien Schepers, Frank Piessens imec-DistriNet, KU Leuven Asia CCS 2017
Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using - - PowerPoint PPT Presentation
Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing Mathy Vanhoef, Domien Schepers, Frank Piessens imec-DistriNet, KU Leuven Asia CCS 2017 Introduction More and more Wi-Fi network use encryption: 2010 Most
Mathy Vanhoef, Domien Schepers, Frank Piessens imec-DistriNet, KU Leuven Asia CCS 2017
2
2010
3
4
WPA-TKIP Short-term solution that sacrificed some security, so it could run on
AES-CCMP Long-term solution based on modern cryptographic primitives
5
6
7
MIC key info header replay counter … key data
key info flags ≈ message ID
P M I S E R C A key version
8
MIC key info header replay counter … key data P M I S E R C A key version
MD5/RC4
SHA1/AES key info flags ≈ message ID
9
Successful connection? Test generation rules
10
Handshake model Set of test cases Normal handshake Correct & incorrect modifications Set of test cases Expert determines exploitability! Execute test case
For every test case
A test case defines:
Inspect failed tests Yes Reset Test failed No (or unexpected reply) Expected result? No
11
12
13
14
15
16
“While Message 4 serves no cryptographic purpose, it serves as an acknowledgment to Message 3. It is required to ensure reliability and to inform the Authenticator that the Supplicant has installed the PTK and GTK and hence can receive encrypted frames.”
17
18
Mathy Vanhoef, Domien Schepers, Frank Piessens