Performance of side-channel attacks on encrypted 802.11 web traffic and impact of network-level noise

Master thesis English OPEN
Pedro Manuel Vasconcelos Fonseca;
(2017)
  • Subject: :Electrical engineering, Electronic engineering, Information engineering [Engineering and technology] | Electrical engineering, Electronic engineering, Information engineering | :Engenharia electrotécnica, electrónica e informática [Ciências da engenharia e tecnologias] | Engenharia electrotécnica, electrónica e informática

No mundo de hoje, as redes Wi-Fi estão difundidas por toda a parte e interligadas ao nosso dia-a-dia: acedemos-lhes através dos nossos smartphones, tablets e telemóveis. Isto significa que inevitavelmente muitos dados sensíveis são transmitidos através destas redes. A e... View more
  • References (7)

    6.1 Analysis of the results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

    6.2 Future work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 2.1 How 802.11 fits in the OSI model. (source: [1]) . . . . . . . . . . . . . . . . . . 4 2.2 The structure of an 802.11 MAC frame. (source: [1]) . . . . . . . . . . . . . . . 5 2.3 A typical side-channel attack in a WiFi network. (source: [2]) . . . . . . . . . . 7 2.4 Setup used in [3]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 3.1 Scenario of a potential attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.2 Flow of an attack, from the preparation to the execution . . . . . . . . . . . . . . 15 3.3 Screenshot of bloomberg.com . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3.4 Screenshot of sigarra.up.pt/feup . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3.5 Excerpt of a traffic capture log . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3.6 Portion of a traffic capture graph . . . . . . . . . . . . . . . . . . . . . . . . . . 19 4.1 Diagram of the various elements of the experimental setup . . . . . . . . . . . . 23 [13] Fan Zhang, Wenbo He, Xue Liu, and Patrick G. Bridges. Inferring Users' Online Activities

    work Security, WiSec '11, pages 59-70, New York, NY, USA, 2011. ACM. URL: http://

    doi.acm.org/10.1145/1998412.1998425, doi:10.1145/1998412.1998425. [14] Tim Stöber, Mario Frank, Jens Schmitt, and Ivan Martinovic. Who Do You Sync You

    ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec '13,

    pages 7-12, New York, NY, USA, 2013. ACM. URL: http://doi.acm.org/10.1145/

    2462096.2462099, doi:10.1145/2462096.2462099.

  • Metrics
Share - Bookmark