BIAS: Bluetooth Impersonation AttackS
Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions of devices. The Bluetooth standard includes a legacy authentication procedure and a secure authentication procedure, allowing devices to authenticate to each other using a long term key. Those procedures are use...
Үндсэн зохиолчид: | Antonioli, D, Tippenhauer, NO, Rasmussen, K |
---|---|
Формат: | Conference item |
Хэл сонгох: | English |
Хэвлэсэн: |
IEEE
2020
|
Ижил төстэй зүйлс
-
Key negotiation downgrade attacks on bluetooth and bluetooth low energy
-н: Antonioli, D, зэрэг
Хэвлэсэн: (2020) -
BLURtooth: exploiting cross-transport key derivation in Bluetooth Classic and Bluetooth Low Energy
-н: Antonioli, D, зэрэг
Хэвлэсэн: (2022) -
The KNOB is broken: Exploiting low entropy in the encryption key negotiation of Bluetooth BR/EDR
-н: Antonioli, D, зэрэг
Хэвлэсэн: (2019) -
Nearby threats: Reversing, analyzing, and attacking Google’s ‘nearby connections’ on android
-н: Rasmussen, K, зэрэг
Хэвлэсэн: (2019) -
Creating Realistic Presentation Attacks for Facial Impersonation Step-by-Step
-н: Roberto Gallardo-Cava, зэрэг
Хэвлэсэн: (2023-01-01)