The dangers of mitigating security design flaws: a wireless case study

TitleThe dangers of mitigating security design flaws: a wireless case study
Publication TypeJournal Articles
Year of Publication2003
AuthorsPetroni NL, Arbaugh WA
JournalIEEE Security & Privacy
Volume1
Issue1
Pagination28 - 36
Date Published2003/02//Jan
ISBN Number1540-7993
KeywordsCommunication system security, computer security, cryptography, design flaw mitigation, Dictionaries, legacy equipment, privacy, Protection, Protocols, security design flaws, security of data, synchronous active attack, telecommunication security, Telecommunication traffic, wired equivalent privacy protocol, Wireless LAN, wireless local area networks, Wireless networks
Abstract

Mitigating design flaws often provides the only means to protect legacy equipment, particularly in wireless local area networks. A synchronous active attack against the wired equivalent privacy protocol demonstrates how mitigating one flaw or attack can facilitate another.

DOI10.1109/MSECP.2003.1176993