Assessing certificate validation user interfaces of WPA supplicants
File version
Version of Record (VoR)
Author(s)
Zheng, Y
Zhang, Q
Bai, G
Qin, M
Zhang, D
Dong, JS
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
Size
File type(s)
Location
Sydney, Australia
Abstract
WPA (Wi-Fi Protected Access) Enterprise is the de facto standard for safeguarding enterprise-level wireless networks. It relies on Transport Layer Security (TLS) to establish a secure tunnel during its authentication process, and thus the notoriously error-prone certificate validation may haunt it. Incorrect validation may lead to the SSL/TLS man-in-The-middle attack, or the evil twin attack in the context of wireless networking, where the supplicant connects and unwittingly sends authentication credentials to a fake access point. We conduct an empirical study on the effectiveness of certificate validation user interfaces (UIs) in WPA supplicants. We focus on a broad variety of mobile devices and mainstream operating systems (OSes), and find that a vast majority of them are susceptible to the evil twin attack. Insecure configuration options and lack of visual security indicators have been found common. Besides, five severe vulnerabilities (four are listed by CVE and one is found in parallel with Google) are identified from their validation processes. By examining the source code of Android's Wi-Fi manager, we link the root causes of these vulnerabilities to the immature designs and implementations of WPA software modules. Our investigation, including a review of Wi-Fi configuration guidelines of the top 200 universities and a realistic experiment deployed in a company with over 50k employees, reveals the user susceptibility in practice. Our findings have been reported to Google, leading to a security enhancement in the WPA supplicant of Android's latest version 11.
Journal Title
Conference Title
MobiCom '22: Proceedings of the 28th Annual International Conference on Mobile Computing And Networking
Book Title
Edition
Volume
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
© 2022 Copyright held by the owner/author(s). This work is licensed under a Creative Commons Attribution‐NonCommercial International 4.0 License.
Item Access Status
Note
Access the data
Related item(s)
Subject
Mobile computing
System and network security
Persistent link to this record
Citation
Wang, K; Zheng, Y; Zhang, Q; Bai, G; Qin, M; Zhang, D; Dong, JS, Assessing certificate validation user interfaces of WPA supplicants, MobiCom '22: Proceedings of the 28th Annual International Conference on Mobile Computing And Networking, 2022, pp. 501-513