March 13, 2017 By Larry Loeb 2 min read

An increased interest in improved mobile user privacy with Wi-Fi networks grew the adoption of Media Access Control (MAC) address randomization. By using a device-created MAC, network transport could be done without a static link to the user being broadcast over the network. The hope was that the user remained anonymous while the networks got their needed MAC.

Future Changes to MAC Needed

The standard is still being worked on by the Institute of Electrical and Electronics Engineers (IEEE), who began testing on the technology in 2014. Apple supported the idea in iOS 8, but dropped support in the most recent iOS 10. Android has made an attempt to support it since 2014 and the Android 6. However, the IEEE may want to go back to the drawing board.

Bleeping Computer recently noted that researchers at the U.S. Naval Academy found a new method to detect individual mobile devices, even if the MAC addresses have gone though a randomization. They revealed the method in their paper, “A Study of MAC Address Randomization in Mobile Devices and When It Fails,” which was published March 8.

Exposing the MAC Address Standard

In the paper, researchers pointed to an unknown flaw that affected the actual hardware of mobile chipsets. It was discovered when they observed a problem in how the chipsets handle low-level control frames: Specific packets were sent by the chipsets when they performed a specific request. These control frames allowed a global MAC to be determined and identified.

This control frame behavior increases the accuracy of identification to 100 percent. That would be impressive in its own right, but it is especially significant when compared to the 50 percent accuracy achieved in a similar 2016 attack. That was chronicled in the report, “Why MAC Address Randomization Is Not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms.”

Researchers from the Naval Academy wrote that the attack worked for all known devices, regardless of the OS, manufacturer, device type or randomization scheme. To make matters worse, they found that Android devices can be susceptible even when the user disabled Wi-Fi or enabled Airplane Mode.

Ramping Up Security

With this attack exposure, researchers proposed a major effort to save the standard practice. For starters, they state that standardized randomization needs to be implemented correctly on any device using Wi-Fi. Additionally, it should use the entire length of the MAC field as randomization input.

This is just the beginning of several proposed recommendations. However, it’s a tall order to get device manufacturers to implement proper randomization techniques while also getting all the manufacturers to act in a consistent manner.

More from

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today