Daniele Antonioli
Daniele Antonioli
Home
Projects
Publications
Talks
Posts
Service
Teaching
Contact
Light
Dark
Automatic
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy
D. Antonioli
,
N. O. Tippenhauer
,
K. Rasmussen
,
M. Payer
October 2020
PDF
Cite
Disclosure
CVE-2020-15802
Type
Preprint
Publication
arXiv
Please enable JavaScript to view the
comments powered by Disqus.
comments powered by
Disqus
Related
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy
BIAS: Bluetooth Impersonation AttackS
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation of Bluetooth BR/EDR
Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android
Cite
×