1. Practical Bluetooth Traffic Sniffing
2. Daniele Antonioli , Nils Ole Tippenhauer , and Kasper Rasmussen . 2019 a. The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation of Bluetooth BR/EDR . In Proceedings of the USENIX Security Symposium. USENIX. Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen. 2019 a. The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation of Bluetooth BR/EDR. In Proceedings of the USENIX Security Symposium. USENIX.
3. Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android
4. BIAS: Bluetooth Impersonation AttackS
5. Daniele Antonioli , Nils Ole Tippenhauer, and Kasper Rasmussen. 2020 b. Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy. Transactions on Privacy and Security (TOPS) ( 2020 ). https://doi.org/10.1145/3394497 10.1145/3394497 Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen. 2020 b. Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy. Transactions on Privacy and Security (TOPS) (2020). https://doi.org/10.1145/3394497