BIAS: Bluetooth Impersonation AttackS
Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions of devices. The Bluetooth standard includes a legacy authentication procedure and a secure authentication procedure, allowing devices to authenticate to each other using a long term key. Those procedures are use...
Autors principals: | Antonioli, D, Tippenhauer, NO, Rasmussen, K |
---|---|
Format: | Conference item |
Idioma: | English |
Publicat: |
IEEE
2020
|
Ítems similars
-
Key negotiation downgrade attacks on bluetooth and bluetooth low energy
per: Antonioli, D, et al.
Publicat: (2020) -
BLURtooth: exploiting cross-transport key derivation in Bluetooth Classic and Bluetooth Low Energy
per: Antonioli, D, et al.
Publicat: (2022) -
The KNOB is broken: Exploiting low entropy in the encryption key negotiation of Bluetooth BR/EDR
per: Antonioli, D, et al.
Publicat: (2019) -
Nearby threats: Reversing, analyzing, and attacking Google’s ‘nearby connections’ on android
per: Rasmussen, K, et al.
Publicat: (2019) -
Creating Realistic Presentation Attacks for Facial Impersonation Step-by-Step
per: Roberto Gallardo-Cava, et al.
Publicat: (2023-01-01)