A Study of MAC Address Randomization in Mobile Devices and When it Fails

Author:

Martin Jeremy1,Mayberry Travis2,Donahue Collin2,Foppe Lucas2,Brown Lamont2,Riggins Chadwick2,Rye Erik C.2,Brown Dane2

Affiliation:

1. The MITRE Corporation, work done partly while at the US Naval Academy (USNA)

2. USNA

Abstract

Abstract Media Access Control (MAC) address randomization is a privacy technique whereby mobile devices rotate through random hardware addresses in order to prevent observers from singling out their traffic or physical location from other nearby devices. Adoption of this technology, however, has been sporadic and varied across device manufacturers. In this paper, we present the first wide-scale study of MAC address randomization in the wild, including a detailed breakdown of different randomization techniques by operating system, manufacturer, and model of device. We then identify multiple flaws in these implementations which can be exploited to defeat randomization as performed by existing devices. First, we show that devices commonly make improper use of randomization by sending wireless frames with the true, global address when they should be using a randomized address. We move on to extend the passive identification techniques of Vanhoef et al. to effectively defeat randomization in ~96% of Android phones. Finally, we identify a previously unknown flaw in the way wireless chipsets handle low-level control frames which applies to 100% of devices we tested. This flaw permits an active attack that can be used under certain circumstances to track any existing wireless device.

Publisher

Walter de Gruyter GmbH

Subject

General Medicine

Reference29 articles.

1. [1] Linux WPA supplicant (IEEE 802.1x, WPA, WPA2, RSN, IEEE 802.11i). https://w1.fi/wpa_supplicant/.

2. [2] IDC: Smartphone vendor market share. http://www.idc.com/promo/smartphone-market-share/vendor.

3. [3] Guidelines for Use Organizationally Unique Identifier (OUI) and Company ID (CID). https://standards.ieee.org/develop/regauth/tut/eui.pdf.

4. [4] WPA supplicant change log. https://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog.

5. [5] China Deputizes Smart Phones to Spy on Beijing Residents’ Real-Time Location. https://www.eff.org/deeplinks/2011/03/china-deputizes-smart-phones-spy-beijing-residents, Oct 2011.

Cited by 104 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Bleach: From WiFi probe-request signatures to MAC association;Ad Hoc Networks;2024-11

2. Passive Identification of WiFi Devices At-Scale: A Data-Driven Approach;2024 IEEE 49th Conference on Local Computer Networks (LCN);2024-10-08

3. Privacy-preserving WiFi fingerprint-based people counting for crowd management;Computer Communications;2024-09

4. Detection of Room Occupancy in Smart Buildings;Radioengineering;2024-09

5. Over-the-Air Runtime Wi-Fi MAC Address Re-randomization;Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks;2024-05-27

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3