Daniele Antonioli
Daniele Antonioli
Home
Projects
Publications
Talks
Posts
Reviews
Students
Courses
Contact
Light
Dark
Automatic
1
BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
D. Antonioli
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem
M. Casagrande
,
R. Cestaro
,
E. Losiouk
,
M. Conti
,
D. Antonioli
On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats
D. Antonioli
,
M. Payer
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy
D. Antonioli
,
N. O. Tippenhauer
,
K. Rasmussen
,
M. Payer
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks
J. Wu
,
R. Wu
,
D. Antonioli
,
M. Payer
,
N. O. Tippenhauer
,
D. Xu
,
D. J. Tian
,
A. Bianchi
BIAS: Bluetooth Impersonation AttackS
D. Antonioli
,
N. O. Tippenhauer
,
K. Rasmussen
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation of Bluetooth BR/EDR
D. Antonioli
,
N. O. Tippenhauer
,
K. Rasmussen
Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android
D. Antonioli
,
N. O. Tippenhauer
,
K. Rasmussen
State-Aware Anomaly Detection for Industrial Control Systems
H. R. Ghaeini
,
D. Antonioli
,
F. Brasser
,
A. R. Sadeghi
,
N. O. Tippenhauer
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3
D. Antonioli
,
H. R. Ghaeini
,
S. Adepu
,
M. Ochoa
,
N. O. Tippenhauer
»
Cite
×