1. Android Build Coastguard Worker, BlueDroid_12.1.0_r19 (2023). https://android.googlesource.com/platform/system/bt/+/refs/tags/android-platform-12.1.0_r19. Accessed 4 Jan 2024
2. Antonioli, D., Tippenhauer, N.O., Rasmussen, K.: BIAS: bluetooth impersonation attacks. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 549–562 (2020)
3. Antonioli, D., Tippenhauer, N.O., Rasmussen, K.: Key negotiation downgrade attacks on bluetooth and bluetooth low energy. ACM Trans. Priv. Secur. (TOPS) 23(3), 1–28 (2020)
4. Antonioli, D., Tippenhauer, N.O., Rasmussen, K.B.: The KNOB is broken: exploiting low entropy in the encryption key negotiation of bluetooth BR/EDR. In: 28th USENIX Security Symposium (USENIX Security 2019), pp. 1047–1061 (2019)
5. Betouin, P.: [Infratech - vulnérabilité] Nouvelle version 0.8 de Bluetooth Stack Smasher (2015). http://www.secuobs.com/news/15022006-bss_0_8.shtml. Accessed 4 Jan 2024