KNOB Attack Code for E0 and Slides from USEC19 are Online

The code that we developed to validate and brute force E0 encryption keys is online.

The slides of my KNOB attack USEC19 talk are also online. As we can see from the slides, the KNOB attack is not conducted while two Bluetooth devices are pairing, but when two devices are connecting (establishing a new encrypted session). Bluetooth (BR/EDR) is a technology with a pair-once connect-multiple-times paradigm. For example, you pair your smartphone with your car once, and then every day you connect the two and the devices negotiate a new (fresh) encryption key.

For more information visit

Daniele Antonioli
PhD in Computer Science, MS and BS Electronics and Telecom Engineering

I’m interested in cyber-physical and wireless systems security.


comments powered by Disqus