Auto-fryingPANAuto-fryingPAN : 무선 개인 영역 네트워크의 개인화된 프로토콜의 분석론과 자동화 방식

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 485
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Yongdae-
dc.contributor.advisor김용대-
dc.contributor.authorChoi, Ki-Bum-
dc.contributor.author최기범-
dc.date.accessioned2017-03-29T02:37:01Z-
dc.date.available2017-03-29T02:37:01Z-
dc.date.issued2016-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=649645&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/221678-
dc.description학위논문(석사) - 한국과학기술원 : 전기및전자공학부, 2016.2 ,[v, 42 p. :]-
dc.description.abstractA spoofing attack for a wireless communication system is the most common attack method for unauthorized access and control. IEEE 802.15.4 is a standard that defines only physical and medium access control layers for low rate, low power, and low cost wireless systems. This standard is widely used as lower layers for not only several wireless communication standards but also customized protocols by manufacturers. However, security has not been considered seriously in customized protocols because of implementation convenience, scalability in deploying, and cost. Their security only relies on confidentiality of customized protocol. This thesis develops methods for manual as well as automatic analysis of these customized protocols. Before developing automatic analysis methodology, we chose three real world targets for manual analysis first: smart plug, center-controlled door lock, and platform screen door system. We then manually analyzed custom protocols on those systems. Spoofing attack based on these results against two targets except platform screen door system were successful. For the last target, we chose not to run the experiment due to significant safety reasons. Analyzed results are converted to generic analysis methodology against customized wireless protocols and typical security vulnerabilities. From generic analysis methodology and vulnerabilities, I implemented prototype of Auto-FryingPAN, an automated custom protocol reverse engineering tool. Auto-FryingPAN automates two main phases of suggested manual analysis methodology. First of all, it groups packets following key information from header. For each packet group, the tool evaluates MAC address field similarity, byte column entropy, byte column range, and CRC possibility. Finally, it combines calculated results and makes final reports for every different message format. By comparing manual analysis, we conclude that Auto-FryingPAN can be extended to a fine-grained automatic protocol reverse-engineering tool or automatic spoofing packet generator.-
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectwireless security-
dc.subjectWireless Personal Area Network (WPAN)-
dc.subjectprotocol reverse engineering-
dc.subjectAutomatic protocol analysis-
dc.subjectIEEE 802.15.4-
dc.subjectCustom protocol-
dc.subject무선 보안-
dc.subject무선 개인 영역 네트워크-
dc.subject프로토콜 역공학-
dc.subject프로토콜 자동화 분석-
dc.subject개인화 프로토콜-
dc.titleAuto-fryingPAN-
dc.title.alternativeAuto-fryingPAN : 무선 개인 영역 네트워크의 개인화된 프로토콜의 분석론과 자동화 방식-
dc.typeThesis(Master)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :전기및전자공학부,-
Appears in Collection
EE-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0