Next: About this document ...
Up: Proximity Breeds Danger: Emerging
Previous: Acknowledgments
- 1
-
Aircrack: a set of tools for auditing wireless networks.
https://freshmeat.net/projects/aircrack/.
- 2
-
DShield.org, Distributed Intrusion Detection System.
https://www.dshield.org.
- 3
-
Honeynet project.
https://www.honeynet.org.
- 4
-
National vulnerability database, united states.
https://nvd.nist.gov.
- 5
-
OpenWRT Project.
https://openwrt.org/.
- 6
-
Securityfocus.com, vulnerabilities.
https://www.securityfocus.com/vulnerabilities.
- 7
-
UMich wireless usage.
https://www.itcom.itd.umich.edu/wireless/stats/yr2006/02/campus.html.
- 8
-
WEP: Dead Again.
https://www.securityfocus.com/infocus/1814#aircrack.
- 9
-
Wifitap: proof of concept for communication over WiFi networks using traffic
injection.
https://sid.rstack.org/index.php/Wifitap_EN.
- 10
-
Wireless Geographic Logging Engine.
https://www.wigle.net/.
- 11
-
A year of bugs.
https://bcheck.scanit.be/bcheck/page.php?name=STATS2004&page=3.
- 12
-
The Spread of the Sapphire/Slammer Worm.
https://www.caida.org/publications/papers/2003/sapphire/sapphire.html,
February 2003.
- 13
-
WMF exploitation.
https://www.f-secure.com/weblog/archives/archive-122005.html,
Dec. 2005.
- 14
-
E. Anderson, K. Eustice, S. Markstrum, M. Hanson, and P. Reiher.
Mobile contagions: Simulation of infection and disease.
In Symposium on Measurement, Modeling, and Simulation of
Malware, June 2005.
- 15
-
W. A. Arbaugh, N. Shankar, and Y. J. Wan.
Your 802.11 wireless network has no clothes.
In IEEE Wireless Communications, 2001.
- 16
-
P. Bahl and V. N. Padmanabhan.
RADAR: An in-building RF-based user location and tracking system.
In Proceedings of the 19th Annual Joint Conference of the IEEE
Computer and Communications Societies (INFOCOM), pages 775-784, 2000.
- 17
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson.
The Internet Motion Sensor: A Distributed Blackhole Monitoring
System.
In Proceedings of the 12th ISOC Symposium on Network and
Distributed Systems Security (SNDSS), pages 167-179, February 2005.
- 18
-
R. Beverly and S. Bauer.
The spoofer project: Inferring the extent of source address filtering
on the internet.
In Proceedings of USENIX Steps to Reducing Unwanted Traffic on
the Internet (SRUTI) Workshop, pages 53-59, July 2005.
- 19
-
R. A. Beyah, C. L. Corbett, and J. A. Copeland.
The case for collaborative distributed wireless intrusion detection
systems.
In IEEE International Conference on Granular Computing, May
2006.
- 20
-
A. Bittau, M. Handley, and J. Lackey.
The final nail in wep's coffin.
In SP '06: Proceedings of the 2006 IEEE Symposium on Security
and Privacy (S&P'06), pages 386-400, Washington, DC, USA, 2006. IEEE
Computer Society.
- 21
-
D. P. Blinn, T. Henderson, and D. Kotz.
Analysis of a Wi-Fi hotspot network.
In Proceedings of the International Workshop on Wireless Traffic
Measurements and Modeling, June 2005.
- 22
-
N. Borisov, I. Goldberg, and D.Wagner.
Intercepting mobile communications: The insecurity of 802.11.
In Proceedings of ACM Mobicom, Rome, Italy, July 2001.
- 23
-
S. Byers, L. F. Cranor, D. P. Kormann, and P. D. McDaniel.
Searching for privacy: Design and implementation of a P2P-enabled
search engine.
In D. Martin and A. Serjantov, editors, Privacy Enhancing
Technologies, volume 3424 of Lecture Notes in Computer Science, pages
314-328. Springer, 2004.
- 24
-
J. Cache and D. Maynor.
Device drivers.
Presentation at Blackhat USA 2006, August 2006.
- 25
-
R. G. Cole, N. Phamdo, M. A. Rajab, and A. Terzis.
Requirements on worm mitigation technologies in MANETS.
In PADS '05: Proceedings of the 19th Workshop on Principles of
Advanced and Distributed Simulation, pages 207-214, Washington, DC, USA,
2005. IEEE Computer Society.
- 26
-
T. Espiner.
Does Wi-Fi security matter?
https://news.com.com/2100-1029_3-6088741.html.
- 27
-
F-Secure.
Cabir worm description.
https://www.f-secure.com/v-descs/cabir.shtml, June 2004.
- 28
-
F-Secure.
Data Security Summary - January to June 2005.
https://www.f-secure.com/2005/1/data-security-summary-2005_1.pdf, 2005.
- 29
-
F-Secure.
Inqtana.A worm information.
https://www.f-secure.com/v-descs/inqtana_a.shtml, Feb. 2006.
- 30
-
S. Fluhrer, I. Mantin, and A. Shamir.
Weaknesses in the key scheduling algorithm of RC4.
In Lecture Notes in Computer Science, 2259:124, 2001.
- 31
-
B. Gedik and L. Liu.
Location privacy in mobile systems: A personalized anonymization
model.
In ICDCS '05: Proceedings of the 25th IEEE International
Conference on Distributed Computing Systems (ICDCS'05), pages 620-629,
Washington, DC, USA, 2005. IEEE Computer Society.
- 32
-
M. Gruteser and D. Grunwald.
Enhancing location privacy in wireless LAN through disposable
interface identifiers: a quantitative analysis.
Mob. Netw. Appl., 10(3):315-325, 2005.
- 33
-
T. Henderson, D. Kotz, and I. Abyzov.
The changing usage of a mature campus-wide wireless network.
In Proceedings of the Tenth Annual International Conference on
Mobile Computing and Networking (MobiCom), Sept. 2004.
- 34
-
W.-J. Hsu and A. Helmy.
On modeling user associations in wireless LAN traces on university
campuses.
In Proceedings of the Second Workshop on Wireless Network
Measurements (WiNMee 2006), Apr. 2006.
- 35
-
Hu and Wang.
Framework for location privacy in wireless networks.
In ACM SIGCOMM Asia Workshop, 2005.
- 36
-
M. Hypponen.
WLAN viruses, anyone?
F-Secure weblog.
https://www.f-secure.com/weblog/archives/archive-082006.html, August
2006.
- 37
-
M. Kim, D. Kotz, and S. Kim.
Extracting a mobility model from real user traces.
In Proceedings of the 25th Annual Joint Conference of the IEEE
Computer and Communications Societies (INFOCOM), Apr. 2006.
- 38
-
B. Krebs.
2005 patch times for Firefox and Internet Explorer.
Washington Post weblog.
https://blog.washingtonpost.com/securityfix/2006/02/2005_patch_times_for_firefox_a.html, Feb. 2006.
- 39
-
B. Krebs.
Internet Explorer unsafe for 284 days in 2006.
Washington Post weblog.
https://blog.washingtonpost.com/securityfix/2007/01/internet_explorer_unsafe_for_2.html, Jan. 2007.
- 40
-
N. Leavitt.
Mobile Phones: The Next Frontier for Hackers?
IEEE Computer, 38(4), April 2005.
- 41
-
C. Martel and V. Nguyen.
Analyzing Kleinberg's (and other) small-world models.
In PODC '04: Proceedings of the twenty-third annual ACM
symposium on Principles of distributed computing, pages 179-188, New York,
NY, USA, 2004. ACM Press.
- 42
-
R. McMillan.
Researchers hack wi-fi driver to breach laptop.
InfoWorld.
https://www.infoworld.com/article/06/06/21/79536_HNwifibreach_1.html,
June 2006.
Accessed on September 15th, 2006.
- 43
-
J. Mickens and B. Noble.
Modeling epidemic spreading in mobile environments.
In Proceedings of the ACM Workshop on Wireless Security, pages
77-96, 2005.
- 44
-
S. Milgram.
The small world problem.
In Psychology Today, 1967.
- 45
-
G. Portokalidis, A. Slowinska, and H. Bos.
Argos: an emulator for fingerprinting zero-day attacks.
In Proc. ACM SIGOPS EUROSYS'2006, Leuven, Belgium, April 2006.
- 46
-
M. Roesch.
Snort: Lightweight intrusion detection for networks.
In Proceedings of USENIX LISA, November 1999.
(software available from https://www.snort.org/).
- 47
-
T. S. Saponas, J. Lester, C. Hartung, and T. Kohno.
Devices That Tell On You: The Nike+iPod Sport Kit.
Technical report, Department of Computer Science and Engineering,
University of Washington, 2007.
- 48
-
C. Shannon and D. Moore.
The Spread of the Witty Worm.
IEEE Security & Privacy, 2(4):46-50, July/August 2004.
- 49
-
S. Stamm, Z. Ramzan, and M. Jakobsson.
Drive-By Pharming.
Technical report, Indiana University, Dec. 2006.
- 50
-
S. Staniford, D. Moore, V. Paxson, and N. Weaver.
The Top Speed of Flash Worms.
In Proceedings of the ACM Workshop on Rapid Malcode (WORM),
pages 33-42, October 2004.
- 51
-
S. Staniford, V. Paxson, and N. Weaver.
How to 0wn the Internet in Your Spare Time.
In Proceedings of the USENIX Security Symposium, pages
149-167, August 2002.
- 52
-
J. Su, K. K. W. Chan, A. G. Miklas, K. Po, A. Akhavan, S. Saroiu, E. de Lara,
and A. Goel.
A preliminary investigation of worm infections in a bluetooth
environment.
In WORM '06: Proceedings of the 4th ACM workshop on Recurring
malcode, pages 9-16, New York, NY, USA, 2006. ACM Press.
- 53
-
Symantec.
Symantec Internet Security Threat Report.
https://www.symantec.com/enterprise/threatreport/index.jsp,
Sept. 2006.
- 54
-
Trend Micro.
Botnet threats and solutions: Phishing - Whitepaper, Nov. 2006.
- 55
-
A. Tsow, M. Jakobsson, L. Yang, and S. Wetzel.
Warkitting: the drive-by subversion of wireless home routers.
Anti-Phishing and Online Fraud, Part II Journal of Digital
Forensic Practice, 1(3), Nov. 2006.