Key negotiation downgrade attacks on bluetooth and bluetooth low energy
Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless technologies specified in the Bluetooth standard. The standard includes key negotiation protocols used to generate long-term keys (during pairing) and session keys (during secure connection establishment). In this work, we demo...
Váldodahkkit: | Antonioli, D, Tippenhauer, NO, Rasmussen, K |
---|---|
Materiálatiipa: | Journal article |
Giella: | English |
Almmustuhtton: |
Association for Computing Machinery
2020
|
Geahča maid
-
BLURtooth: exploiting cross-transport key derivation in Bluetooth Classic and Bluetooth Low Energy
Dahkki: Antonioli, D, et al.
Almmustuhtton: (2022) -
BIAS: Bluetooth Impersonation AttackS
Dahkki: Antonioli, D, et al.
Almmustuhtton: (2020) -
The KNOB is broken: Exploiting low entropy in the encryption key negotiation of Bluetooth BR/EDR
Dahkki: Antonioli, D, et al.
Almmustuhtton: (2019) -
What's in a downgrade? A taxonomy of downgrade attacks in the TLS protocol and application protocols using TLS
Dahkki: Alashwali, ES, et al.
Almmustuhtton: (2018) -
Pseudolite with bluetooth low energy beacons
Dahkki: Yong, Maverick Kim Wee
Almmustuhtton: (2018)