Author:
Jang Min,Hwang Yuna,Kwon Yonghwi,Kim Hyoungshick
Publisher
Springer Nature Singapore
Reference25 articles.
1. MITRE. https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=bluetooth. Accessed 15 Sept 2023
2. Bluetooth Specifications. https://www.bluetooth.com/specifications/specs/. Accessed 15 Sept 2023
3. BLUETOOTH CORE SPECIFICATION Version 5.2, pp. 1026–1028. https://www.bluetooth.org/docman/handlers/DownloadDoc.ashx?doc_id=478726. Accessed 15 Sept 2023
4. Manès, V.J.M., et al.: The art, science, and engineering of fuzzing: a survey. IEEE Trans. Softw. Eng. 47, 2312–2331 (2019)
5. Xu, F., Diao, W., Li, Z., Chen, J., Zhang, K.: BadBluetooth: breaking android security mechanisms via malicious bluetooth peripherals. In: Network and Distributed System Security Symposium (NDSS 2019) (2019)