BIAS: Bluetooth Impersonation AttackS
Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions of devices. The Bluetooth standard includes a legacy authentication procedure and a secure authentication procedure, allowing devices to authenticate to each other using a long term key. Those procedures are use...
Κύριοι συγγραφείς: | Antonioli, D, Tippenhauer, NO, Rasmussen, K |
---|---|
Μορφή: | Conference item |
Γλώσσα: | English |
Έκδοση: |
IEEE
2020
|
Παρόμοια τεκμήρια
Παρόμοια τεκμήρια
-
Key negotiation downgrade attacks on bluetooth and bluetooth low energy
ανά: Antonioli, D, κ.ά.
Έκδοση: (2020) -
BLURtooth: exploiting cross-transport key derivation in Bluetooth Classic and Bluetooth Low Energy
ανά: Antonioli, D, κ.ά.
Έκδοση: (2022) -
The KNOB is broken: Exploiting low entropy in the encryption key negotiation of Bluetooth BR/EDR
ανά: Antonioli, D, κ.ά.
Έκδοση: (2019) -
Nearby threats: Reversing, analyzing, and attacking Google’s ‘nearby connections’ on android
ανά: Rasmussen, K, κ.ά.
Έκδοση: (2019) -
Creating Realistic Presentation Attacks for Facial Impersonation Step-by-Step
ανά: Roberto Gallardo-Cava, κ.ά.
Έκδοση: (2023-01-01)