Dartmouth College Computer Science
Technical Report series
TR search TR listserv
|By author:||A B C D E F G H I J K L M N O P Q R S T U V W X Y Z|
|By number:||2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003, 2002, 2001, 2000, 1999, 1998, 1997, 1996, 1995, 1994, 1993, 1992, 1991, 1990, 1989, 1988, 1987, 1986|
We propose a simple active method for discovering facts about the
chipset, the firmware or the driver of an 802.11 wireless device by
observing its responses (or lack thereof) to a series of crafted
non-standard or malformed 802.11 frames. We demonstrate that such
responses can differ significantly enough to distinguish between a
number of popular chipsets and drivers. We expect to significantly
expand the number of recognized device types through community
contributions of signature data for the proposed open fingerprinting
framework. Our method complements known fingerprinting approaches, and
can be used to interrogate and spot devices that may be spoofing their
MAC addresses in order to conceal their true architecture from other
stations, such as a fake AP seeking to engage clients in complex
protocol frame exchange (e.g., in order to exploit a driver
vulnerability). In particular, it can be used to distinguish rogue
APs from legitimate APs before association.
Short version presented at WiSec 2008, Alexandria, VA
Bibliographic citation for this report: [plain text] [BIB] [BibTeX] [Refer]
Or copy and paste:
Sergey Bratus, Cory Cornelius, Daniel Peebles, and David Kotz, "Active Behavioral Fingerprinting of Wireless Devices." Dartmouth Computer Science Technical Report TR2008-610, March 2008.
Notify me about new tech reports.
Search the technical reports.
To receive paper copy of a report, by mail, send your address and the TR number to reports AT cs.dartmouth.edu
Copyright notice: The documents contained in this server are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
Technical reports collection maintained by David Kotz.