Author:
Claverie Tristan,Avoine Gildas,Delaune Stéphanie,Esteves José Lopes
Publisher
Springer Nature Switzerland
Reference42 articles.
1. Antonioli, D., Tippenhauer, N.O., Rasmussen, K.: BIAS: Bluetooth Impersonation AttackS. In: 41st IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, 18–21 May 2020, pp. 549–562. IEEE Computer Society (2020). https://doi.org/10.1109/SP40000.2020.00093
2. Antonioli, D., Tippenhauer, N.O., Rasmussen, K.: Key negotiation downgrade attacks on Bluetooth and Bluetooth low energy. ACM Trans. Priv. Secur. 23(3), 1–28 (2020). https://doi.org/10.1145/3394497
3. Antonioli, D., Tippenhauer, N.O., Rasmussen, K., Payer, M.: BLURtooth: exploiting cross-transport key derivation in Bluetooth classic and Bluetooth low energy. In: ASIA CCS 2022: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022–3 June 2022, pp. 196–207. ACM (2022). https://doi.org/10.1145/3488932.3523258
4. Antonioli, D., Tippenhauer, N.O., Rasmussen, K.B.: The KNOB is broken: exploiting low entropy in the encryption key negotiation of Bluetooth BR/EDR. In: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, 14–16 August 2019, pp. 1047–1061. USENIX Association (2019)
5. Basin, D.A., Sasse, R., Toro-Pozo, J.: The EMV standard: break, fix, verify. In: 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, US, 23–27 May 2021, pp. 1766–1781. IEEE (2021). https://doi.org/10.1109/SP40001.2021.00037