Daniele Antonioli
Daniele Antonioli
Home
Projects
Publications
Talks
Posts
Service
Teaching
Contact
Light
Dark
Automatic
BIAS: Bluetooth Impersonation AttackS
D. Antonioli
,
N. O. Tippenhauer
,
K. Rasmussen
March 2020
PDF
Cite
Code
Project
Slides
Video
Teaser
Website
CVE-2020-10135
Type
Conference paper
Publication
IEEE Symposium on Security and Privacy
Please enable JavaScript to view the
comments powered by Disqus.
comments powered by
Disqus
Related
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation of Bluetooth BR/EDR
Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks
Cite
×