WAC3 Presentation is Online

BIAS + KNOB attack against Bluetooth: All the WAC talks are available on YouTube

WAC3 Talk About KNOB and BIAS Attacks

I’m glad to give a talk about the KNOB and BIAS attacks on Bluetooth at the third Workshop on Attacks in Cryptography (WAC) co-located with CRYPTO 2020. The Workshop will be held online on Zoom the 16th of August 2020, and my talk will be from 13:20 to 14:00 (EDT) in the Attacks on Standards session (session IV).

Slides and video from our 2020 talk

Here are the slides and the recording of our talk titled From Bluetooth Standard to Standard-Compliant 0-days:

Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy

Our new paper Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy will appear in the ACM Transactions on Privacy and Security. Our paper extends our previous work on the KNOB attack on Bluetooth BR/EDR to Bluetooth Low Energy (BLE), presents an updated evaluation of the KNOB attack for Bluetooth BR/EDR and discusses some of the countermeasures put in place by vendors such as Google and Apple after the disclosure of the KNOB attack and the amendment of the Bluetooth standard.

KNOB Attacks Talk at 2020

I’m glad to give a talk titled From the Bluetooth Standard to Standard Compliant 0-days together with Mathias Payer at the virtual edition of 2020. Our talk covers, among others, the technical details behind the Key Negotiation Of Bluetooth (KNOB) attack on Bluetooth BR/EDR, its extension to BLE, and the countermeasures adopted by vendors, such as Google and Apple, to mitigate the KNOB attacks.

InspiredResearch Newsletter University of Oxford

The InspiredResearch (Winter 2019 Issue 15) twice-yearly newsletter from the Computer Science Department of the University of Oxford features a nice article about the KNOB attack by Prof. Kasper Rasmussen.

Security Engineering Third Edition (SEv3)

Recently, I’ve stumbled upon the webpage about Security Engineering – Third Edition (SEv3) by Prof. Ross Anderson. I’m particularly attached to this book, as it is the first book about information security that I bought (I bought SEv2 in 2012), and it was very helpful to introduce me to security engineering (coming from an EE background) and to tackle my master thesis about Random Number Generators.

KNOB Attack References and Advisories

I’ve collected a list of references and advisories about the KNOB attack from several hardware and software providers and organizations. You can find it in the last paragraph of the “Are my Devices Vulnerable?

Video of my KNOB Attack Presentation at USENIX Security 2019

Title of the paper: The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR: More info at

KNOB Attack Interview with Dave Bittner (CyberWire)

Today CyberWire aired my interview about the KNOB attack with Dave Bittner.