From 87e3e047ee942eaf1433f714e625596a1b82f65c Mon Sep 17 00:00:00 2001 From: Mathy Vanhoef Date: Fri, 9 Oct 2020 14:28:57 +0400 Subject: [PATCH] fragattack: updated embargo notes --- research/README.md | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/research/README.md b/research/README.md index cc3f7eb91..d498ca68f 100644 --- a/research/README.md +++ b/research/README.md @@ -10,9 +10,13 @@ Older WPA networks by default use TKIP for encryption, and the applicability of this cipher are discussed in the paper. To illustrate that Wi-Fi has been vulnerable since its creation, the paper also briefly discusses the applicability of the attacks against WEP. -_Embargo note_: this document refers to sections in **draft version 2 of the paper** "Fragment and Forge: -Breaking Wi-Fi Through Frame Aggregation and Fragmentation". This paper can be found in the root directory -of this repository. +_Embargo notes_: + +- This document refers to sections in **draft version 2 of the paper** "Fragment and Forge: Breaking Wi-Fi + Through Frame Aggregation and Fragmentation". This paper can be found in the root directory of this repository. + +- For each implementation flaw we list a reference CVE identifier. There's currently an ongoing discussion + whether these CVEs can be used across different codebases. # 2. Supported Network Cards