Issue No. 01 - January-February (2003 vol. 1)
Nick L. Petroni Jr. , University of Maryland, College Park
William A. Arbaugh , University of Maryland, College Park
<p>Mitigating design flaws often provides the only means to pro0tect legacy equipment, particularly in wireless local area networks. A synchronous active attack against the wired equivalent privacy protocol demonstrates how mitigating one flaw or attack can facilitate another.</p>
Wireless Network Security
W. A. Arbaugh and N. L. Petroni Jr., "The Dangers of Mitigating Security Design Flaws: A Wireless Case Study," in IEEE Security & Privacy, vol. 1, no. , pp. 28-36, 2003.