A survey on IoT-enabled home automation systems: Attacks and defenses
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …
Formal model-driven discovery of bluetooth protocol design vulnerabilities
The Bluetooth protocol suite, including Bluetooth Classic, Bluetooth Low Energy, and
Bluetooth Mesh, has become the de facto standard for short-range wireless …
Bluetooth Mesh, has become the de facto standard for short-range wireless …
Formal Analysis and Patching of {BLE-SC} Pairing
Bluetooth Low Energy (BLE) is the mainstream Bluetooth standard and BLE Secure
Connections (BLC-SC) pairing is a protocol that authenticates two Bluetooth devices and …
Connections (BLC-SC) pairing is a protocol that authenticates two Bluetooth devices and …
Selfie: reflections on TLS 1.3 with PSK
TLS 1.3 allows two parties to establish a shared session key from an out-of-band agreed pre-
shared key (PSK). The PSK is used to mutually authenticate the parties, under the …
shared key (PSK). The PSK is used to mutually authenticate the parties, under the …
物联网安全研究综述: 威胁, 检测与防御
杨毅宇, 周威, 赵尚儒, 刘聪, 张宇辉, 王鹤… - 通信 …, 2021 - infocomm-journal.com
基于近5 年网安国际会议(ACM CCS, USENIX Security, NDSS, IEEE S&P)
中发表的物联网安全文献, 以及其他部分高水平研究工作, 从威胁, 检测, 防御的视角对物联网 …
中发表的物联网安全文献, 以及其他部分高水平研究工作, 从威胁, 检测, 防御的视角对物联网 …
Breakmi: Reversing, exploiting and fixing xiaomi fitness tracking ecosystem
Xiaomi is the leading company in the fitness tracking industry. Successful attacks on its
fitness tracking ecosystem would result in severe consequences, including the loss of …
fitness tracking ecosystem would result in severe consequences, including the loss of …
Reviewing IoT security via logic bugs in IoT platforms and systems
In recent years, Internet-of-Things (IoT) platforms and systems have been rapidly emerging.
Although IoT is a new technology, new does not mean simpler (than existing networked …
Although IoT is a new technology, new does not mean simpler (than existing networked …
[PDF][PDF] Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing.
Bluetooth is a leading wireless communication technology used by billions of Internet of
Things (IoT) devices today. Its ubiquity demands systematic security scrutiny. A key …
Things (IoT) devices today. Its ubiquity demands systematic security scrutiny. A key …
SoK: a systematic literature review of Bluetooth security threats and mitigation measures
S Shrestha, E Irby, R Thapa, S Das - International Symposium on …, 2022 - Springer
Bluetooth devices have integrated into our everyday lives such that we see an increase in
wearable technologies. Users of these devices are often unaware of the security …
wearable technologies. Users of these devices are often unaware of the security …
EvilScreen attack: smart TV hijacking via multi-channel remote control mimicry
Modern smart TVs often communicate with their remote controls (including the smartphone
simulated ones) using multiple wireless channels (eg, Infrared, Bluetooth, and Wi-Fi) …
simulated ones) using multiple wireless channels (eg, Infrared, Bluetooth, and Wi-Fi) …