Misbinding attacks on secure device pairing and bootstrapping

M Sethi, A Peltonen, T Aura - … Computer and Communications Security, 2019 - dl.acm.org
… We will now look at identity misbinding attacks against wireless device pairing where user …
two physical devices. Figure 2(a) shows a common structure for many such pairing protocols. …

[HTML][HTML] Formal verification of misbinding attacks on secure device pairing and bootstrapping

A Peltonen, M Sethi, T Aura - Journal of Information Security and …, 2020 - Elsevier
… We will now look at identity misbinding attacks against wireless device pairing where user
… two physical devices. Fig. 4(a) shows a common structure for many such pairing protocols. …

[PDF][PDF] Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.

M Naveed, X Zhou, S Demetriou, XF Wang, CA Gunter - NDSS, 2014 - sharps.org
… To this end, we built end-to-end attacks on popular smartphoneenabled medical devices
class [24], which gives a list of devices paired with the phone and their bonding data. In our …

Breaking secure pairing of bluetooth low energy using downgrade attacks

Y Zhang, J Weng, R Dey, Y Jin, Z Lin, X Fu - 29th USENIX Security …, 2020 - usenix.org
… was paired with a peer BLE device through secure pairing using … all attacks introduced in
this paper can also be deployed if the Android and its peer device have not paired or paired

[HTML][HTML] Security analysis of out-of-band device pairing protocols: A survey

S Khalfaoui, J Leneutre, A Villard, J Ma… - … and Mobile Computing, 2021 - hindawi.com
security analysis framework to assess these pairing techniques. In this paper, we survey a
selection of secure device pairing … (iv) We discuss the recently published misbinding attack by …

On the (in) security of bluetooth low energy one-way secure connections only mode

Y Zhang, J Weng, R Dey, Y Jin, Z Lin, X Fu - arXiv preprint arXiv …, 2019 - arxiv.org
… was paired with a peer BLE device through secure pairing … /spoofing device can downgrade
the pairing protocol, pair … the attack, the Android mobile and its peer device are paired

[PDF][PDF] Misbinding Attacks on Secure Device Pairing

T Aura - pdfs.semanticscholar.org
… all the secrets even without misbinding • Problem related to data authentication. Victim is
confused about to who it at the other end of the secure connection … Misbinding in device pairing

[PDF][PDF] Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing.

MK Jangid, Y Zhang, Z Lin - NDSS, 2023 - cse.ohio-state.edu
… However, there could be other attacks (our paper ultimately uncover 5 attacks against PE).
We … PE pairings will expose a large attack surface and may uncover unknown attacks of PE. …

Formal Verification and Standardization of Security Protocols

A Peltonen - 2023 - aaltodoc.aalto.fi
… their intended security goals. We identify an identity misbinding attack in device pairing and
… Our case study discovers multiple variations of the attack in Bluetooth, Device Provisioning …

[HTML][HTML] Evaluation of out-of-band channels for IoT security

S Latvala, M Sethi, T Aura - SN Computer Science, 2020 - Springer
attacks require that the device being configured by the user has already been compromised.
We noted that misbinding attacks are … usability study of secure device pairing methods. In: …