NDSS 2025 – CHAOS: Exploiting Station Time Synchronization In 802.11 Networks Session 1A: WiFi and Bluetooth Security
研究者提出了一种名为CHAOS的新策略,利用WiFi的时间同步功能,在信标帧中嵌入秘密信号。通过分析信标帧顺序和TSF时间戳的不精确性,在标准硬件上实现520 bit/s的数据传输,并具有良好的隐蔽性和稳定性。 2025-10-25 15:0:0 Author: securityboulevard.com(查看原文) 阅读量:7 收藏

Authors, Creators & Presenters: Sirus Shahini (University of Utah), Robert Ricci (University of Utah)
PAPER – CHAOS: Exploiting Station Time Synchronization in 802.11 Networks
Many locations, especially in urban areas, are quite noisy with WiFi traffic. In addition to data traffic, WiFi stations send management and control frames that can easily exceed several hundred frames per second just in one small area. These WiFi environments present the opportunity to transmit data through hiding it within the noise components that can be normal parts of benign transmissions. In this paper, we show how one particular feature of WiFi, the Timing Synchronization Function (TSF), can be exploited to create a fertile and robust channel for embedding secret signals. We take advantage of the fact that there is always some degree of imprecision reflected in time synchronization of WiFi stations. We present CHAOS, a new covert channel strategy to embed data bits in WiFi beacon frames using unmodified standard WiFi hardware. CHAOS makes use of the noise properties inherent in WiFi in two ways: First, it encodes information in the ordering of beacon frames, taking advantage of the fact that there is no natural or required ordering of beacons. Second, it makes use of a timing channel in the form of the TSF timestamp in management headers, imitating the natural imprecision of timing in real base stations to encode data in a way that is statistically similar to unmodified frames. CHAOS’s parameters can be adjusted to configure data rate, the covert channel stability and frame miss rate; using our suggested settings, it is able to robustly broadcast secret data at 520 bits/s. We also show that TSF has substantial potential for further exploitation, sketching a correlation attack that uses it to map clients to base stations.

Cruise Con 2025

Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the organization’s’ YouTube channel.

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.infosecurity.us/blog/2025/10/25/ndss-2025-chaos-exploiting-station-time-synchronization-in-80211-networks-session-1a-wifi-and-bluetooth-security


文章来源: https://securityboulevard.com/2025/10/ndss-2025-chaos-exploiting-station-time-synchronization-in-802-11-networks-session-1a-wifi-and-bluetooth-security/
如有侵权请联系:admin#unsafe.sh