Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Proximity Breeds Danger: Emerging Previous: Acknowledgments

Bibliography

1
Aircrack: a set of tools for auditing wireless networks.
https://freshmeat.net/projects/aircrack/.

2
DShield.org, Distributed Intrusion Detection System.
https://www.dshield.org.

3
Honeynet project.
https://www.honeynet.org.

4
National vulnerability database, united states.
https://nvd.nist.gov.

5
OpenWRT Project.
https://openwrt.org/.

6
Securityfocus.com, vulnerabilities.
https://www.securityfocus.com/vulnerabilities.

7
UMich wireless usage.
https://www.itcom.itd.umich.edu/wireless/stats/yr2006/02/campus.html.

8
WEP: Dead Again.
https://www.securityfocus.com/infocus/1814#aircrack.

9
Wifitap: proof of concept for communication over WiFi networks using traffic injection.
https://sid.rstack.org/index.php/Wifitap_EN.

10
Wireless Geographic Logging Engine.
https://www.wigle.net/.

11
A year of bugs.
https://bcheck.scanit.be/bcheck/page.php?name=STATS2004&page=3.

12
The Spread of the Sapphire/Slammer Worm.
https://www.caida.org/publications/papers/2003/sapphire/sapphire.html, February 2003.

13
WMF exploitation.
https://www.f-secure.com/weblog/archives/archive-122005.html, Dec. 2005.

14
E. Anderson, K. Eustice, S. Markstrum, M. Hanson, and P. Reiher.
Mobile contagions: Simulation of infection and disease.
In Symposium on Measurement, Modeling, and Simulation of Malware, June 2005.

15
W. A. Arbaugh, N. Shankar, and Y. J. Wan.
Your 802.11 wireless network has no clothes.
In IEEE Wireless Communications, 2001.

16
P. Bahl and V. N. Padmanabhan.
RADAR: An in-building RF-based user location and tracking system.
In Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pages 775-784, 2000.

17
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson.
The Internet Motion Sensor: A Distributed Blackhole Monitoring System.
In Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (SNDSS), pages 167-179, February 2005.

18
R. Beverly and S. Bauer.
The spoofer project: Inferring the extent of source address filtering on the internet.
In Proceedings of USENIX Steps to Reducing Unwanted Traffic on the Internet (SRUTI) Workshop, pages 53-59, July 2005.

19
R. A. Beyah, C. L. Corbett, and J. A. Copeland.
The case for collaborative distributed wireless intrusion detection systems.
In IEEE International Conference on Granular Computing, May 2006.

20
A. Bittau, M. Handley, and J. Lackey.
The final nail in wep's coffin.
In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pages 386-400, Washington, DC, USA, 2006. IEEE Computer Society.

21
D. P. Blinn, T. Henderson, and D. Kotz.
Analysis of a Wi-Fi hotspot network.
In Proceedings of the International Workshop on Wireless Traffic Measurements and Modeling, June 2005.

22
N. Borisov, I. Goldberg, and D.Wagner.
Intercepting mobile communications: The insecurity of 802.11.
In Proceedings of ACM Mobicom, Rome, Italy, July 2001.

23
S. Byers, L. F. Cranor, D. P. Kormann, and P. D. McDaniel.
Searching for privacy: Design and implementation of a P2P-enabled search engine.
In D. Martin and A. Serjantov, editors, Privacy Enhancing Technologies, volume 3424 of Lecture Notes in Computer Science, pages 314-328. Springer, 2004.

24
J. Cache and D. Maynor.
Device drivers.
Presentation at Blackhat USA 2006, August 2006.

25
R. G. Cole, N. Phamdo, M. A. Rajab, and A. Terzis.
Requirements on worm mitigation technologies in MANETS.
In PADS '05: Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation, pages 207-214, Washington, DC, USA, 2005. IEEE Computer Society.

26
T. Espiner.
Does Wi-Fi security matter?
https://news.com.com/2100-1029_3-6088741.html.

27
F-Secure.
Cabir worm description.
https://www.f-secure.com/v-descs/cabir.shtml, June 2004.

28
F-Secure.
Data Security Summary - January to June 2005.
https://www.f-secure.com/2005/1/data-security-summary-2005_1.pdf, 2005.

29
F-Secure.
Inqtana.A worm information.
https://www.f-secure.com/v-descs/inqtana_a.shtml, Feb. 2006.

30
S. Fluhrer, I. Mantin, and A. Shamir.
Weaknesses in the key scheduling algorithm of RC4.
In Lecture Notes in Computer Science, 2259:124, 2001.

31
B. Gedik and L. Liu.
Location privacy in mobile systems: A personalized anonymization model.
In ICDCS '05: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), pages 620-629, Washington, DC, USA, 2005. IEEE Computer Society.

32
M. Gruteser and D. Grunwald.
Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis.
Mob. Netw. Appl., 10(3):315-325, 2005.

33
T. Henderson, D. Kotz, and I. Abyzov.
The changing usage of a mature campus-wide wireless network.
In Proceedings of the Tenth Annual International Conference on Mobile Computing and Networking (MobiCom), Sept. 2004.

34
W.-J. Hsu and A. Helmy.
On modeling user associations in wireless LAN traces on university campuses.
In Proceedings of the Second Workshop on Wireless Network Measurements (WiNMee 2006), Apr. 2006.

35
Hu and Wang.
Framework for location privacy in wireless networks.
In ACM SIGCOMM Asia Workshop, 2005.

36
M. Hypponen.
WLAN viruses, anyone?
F-Secure weblog. https://www.f-secure.com/weblog/archives/archive-082006.html, August 2006.

37
M. Kim, D. Kotz, and S. Kim.
Extracting a mobility model from real user traces.
In Proceedings of the 25th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), Apr. 2006.

38
B. Krebs.
2005 patch times for Firefox and Internet Explorer.
Washington Post weblog. https://blog.washingtonpost.com/securityfix/2006/02/2005_patch_times_for_firefox_a.html, Feb. 2006.

39
B. Krebs.
Internet Explorer unsafe for 284 days in 2006.
Washington Post weblog. https://blog.washingtonpost.com/securityfix/2007/01/internet_explorer_unsafe_for_2.html, Jan. 2007.

40
N. Leavitt.
Mobile Phones: The Next Frontier for Hackers?
IEEE Computer, 38(4), April 2005.

41
C. Martel and V. Nguyen.
Analyzing Kleinberg's (and other) small-world models.
In PODC '04: Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing, pages 179-188, New York, NY, USA, 2004. ACM Press.

42
R. McMillan.
Researchers hack wi-fi driver to breach laptop.
InfoWorld. https://www.infoworld.com/article/06/06/21/79536_HNwifibreach_1.html, June 2006.
Accessed on September 15th, 2006.

43
J. Mickens and B. Noble.
Modeling epidemic spreading in mobile environments.
In Proceedings of the ACM Workshop on Wireless Security, pages 77-96, 2005.

44
S. Milgram.
The small world problem.
In Psychology Today, 1967.

45
G. Portokalidis, A. Slowinska, and H. Bos.
Argos: an emulator for fingerprinting zero-day attacks.
In Proc. ACM SIGOPS EUROSYS'2006, Leuven, Belgium, April 2006.

46
M. Roesch.
Snort: Lightweight intrusion detection for networks.
In Proceedings of USENIX LISA, November 1999.
(software available from https://www.snort.org/).

47
T. S. Saponas, J. Lester, C. Hartung, and T. Kohno.
Devices That Tell On You: The Nike+iPod Sport Kit.
Technical report, Department of Computer Science and Engineering, University of Washington, 2007.

48
C. Shannon and D. Moore.
The Spread of the Witty Worm.
IEEE Security & Privacy, 2(4):46-50, July/August 2004.

49
S. Stamm, Z. Ramzan, and M. Jakobsson.
Drive-By Pharming.
Technical report, Indiana University, Dec. 2006.

50
S. Staniford, D. Moore, V. Paxson, and N. Weaver.
The Top Speed of Flash Worms.
In Proceedings of the ACM Workshop on Rapid Malcode (WORM), pages 33-42, October 2004.

51
S. Staniford, V. Paxson, and N. Weaver.
How to 0wn the Internet in Your Spare Time.
In Proceedings of the USENIX Security Symposium, pages 149-167, August 2002.

52
J. Su, K. K. W. Chan, A. G. Miklas, K. Po, A. Akhavan, S. Saroiu, E. de Lara, and A. Goel.
A preliminary investigation of worm infections in a bluetooth environment.
In WORM '06: Proceedings of the 4th ACM workshop on Recurring malcode, pages 9-16, New York, NY, USA, 2006. ACM Press.

53
Symantec.
Symantec Internet Security Threat Report.
https://www.symantec.com/enterprise/threatreport/index.jsp, Sept. 2006.

54
Trend Micro.
Botnet threats and solutions: Phishing - Whitepaper, Nov. 2006.

55
A. Tsow, M. Jakobsson, L. Yang, and S. Wetzel.
Warkitting: the drive-by subversion of wireless home routers.
Anti-Phishing and Online Fraud, Part II Journal of Digital Forensic Practice, 1(3), Nov. 2006.