Daniele Antonioli
Daniele Antonioli
Home
Projects
Publications
Talks
Posts
Reviews
Students
Courses
Contact
Light
Dark
Automatic
1
CTRAPS: CTAP Client Impersonation and API Confusion on FIDO2
M. Casagrande
,
D. Antonioli
E-Trojans: Ransomware, Tracking, DoS, and Data Leaks on Battery-powered Embedded Systems
M. Casagrande
,
R. Cestaro
,
E. Losiouk
,
M. Conti
,
D. Antonioli
BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
D. Antonioli
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem
M. Casagrande
,
R. Cestaro
,
E. Losiouk
,
M. Conti
,
D. Antonioli
On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats
D. Antonioli
,
M. Payer
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy
D. Antonioli
,
N. O. Tippenhauer
,
K. Rasmussen
,
M. Payer
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks
J. Wu
,
R. Wu
,
D. Antonioli
,
M. Payer
,
N. O. Tippenhauer
,
D. Xu
,
D. J. Tian
,
A. Bianchi
BIAS: Bluetooth Impersonation AttackS
D. Antonioli
,
N. O. Tippenhauer
,
K. Rasmussen
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation of Bluetooth BR/EDR
D. Antonioli
,
N. O. Tippenhauer
,
K. Rasmussen
Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android
D. Antonioli
,
N. O. Tippenhauer
,
K. Rasmussen
»
Cite
×