暂无分享,去创建一个
Jian Weng | Xinwen Fu | Yue Zhang | Yier Jin | Rajib Dey | Zhiqiang Lin | Zhiqiang Lin | J. Weng | Xinwen Fu | Yier Jin | Yue Zhang | Rajib Dey
[1] Carl A. Gunter,et al. Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android , 2014, NDSS.
[2] Dan Curticapean,et al. Magic of Light , 2010, Optical Engineering + Applications.
[3] Brian Cusack,et al. Assessment of security vulnerabilities in wearable devices , 2017 .
[4] S. Sandhya,et al. Analysis of Bluetooth threats and v4.0 security features , 2012, 2012 International Conference on Computing, Communication and Applications.
[5] Zhiyao Liang,et al. Security analysis of bluetooth low energy based smart wristbands , 2017, 2017 2nd International Conference on Frontiers of Sensors Technologies (ICFST).
[6] Thaier Hayajneh,et al. Security Vulnerabilities in Bluetooth Technology as Used in IoT , 2018, J. Sens. Actuator Networks.
[7] Dennis Kügler,et al. "Man in the Middle" Attacks on Bluetooth , 2003, Financial Cryptography.
[8] Jacques Klein,et al. AndroZoo: Collecting Millions of Android Apps for the Research Community , 2016, 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR).
[9] George Loukas,et al. Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems , 2017, 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA).
[10] Shi-Min Hu,et al. Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[11] Tal Melamed. An active man-in-the-middle attack on bluetooth smart devices , 2018 .
[12] I. Mahgoub,et al. Bluetooth Security in Wearable Computing Applications , 2008, 2008 International Symposium on High Capacity Optical Networks and Enabling Technologies.
[13] Daniela Miao,et al. Security Analysis of Wearable Fitness Devices ( Fitbit ) , 2014 .
[14] Yi Mu,et al. Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure , 2018, Personal and Ubiquitous Computing.
[15] Mike Ryan,et al. Bluetooth: With Low Energy Comes Low Security , 2013, WOOT.
[16] Wondimu K. Zegeye. Exploiting Bluetooth Low Energy Pairing Vulnerability in Telemedicine , 2015 .
[17] Sunghyun Cho,et al. Bluetooth low energy security vulnerability and improvement method , 2016, 2016 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia).
[18] Avishai Wool,et al. Cracking the Bluetooth PIN , 2005, MobiSys '05.
[19] Jorge Blasco Alís,et al. A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals , 2018, CODASPY.
[20] Parth H. Pathak,et al. Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers , 2016, HotMobile.
[21] Zhou Li,et al. BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals , 2019, NDSS.
[22] Keijo Haataja,et al. Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures , 2010, IEEE Transactions on Wireless Communications.
[23] Kang G. Shin,et al. Protecting Privacy of BLE Device Users , 2016, USENIX Security Symposium.
[24] Jorge Blasco,et al. A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape , 2018, USENIX Security Symposium.
[25] M. Ufuk Çaglayan,et al. Relay Attacks on Bluetooth Authentication and Solutions , 2004, ISCIS.
[26] 吉田 則裕,et al. Android Open Source Projectを対象としたパッチレビュー活動の調査 , 2012 .
[27] Jason Uher,et al. Denial of Sleep attacks in Bluetooth Low Energy wireless sensor networks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[28] Tomás Rosa,et al. Bypassing Passkey Authentication in Bluetooth Low Energy , 2013, IACR Cryptol. ePrint Arch..
[29] Laurie J. Hendren,et al. Optimizing Java Bytecode Using the Soot Framework: Is It Feasible? , 2000, CC.
[30] K. Hypponen,et al. “Nino” man-in-the-middle attack on bluetooth secure simple pairing , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.
[31] Jorge Blasco,et al. Attacks Against BLE Devices by Co-located Mobile Applications , 2018, ArXiv.
[32] K. Haataja,et al. Practical Man-in-the-Middle Attacks Against Bluetooth Secure Simple Pairing , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[33] Naresh Gupta,et al. Inside Bluetooth Low Energy , 2016 .
[34] Jacques Klein,et al. Reflection-aware static analysis of Android apps , 2016, 2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE).
[35] Andrea Bittau,et al. BlueSniff: Eve Meets Alice and Bluetooth , 2007, WOOT.