Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controller.
Romain CayreGéraldine Vache MarconatoFlorent GaltierMohamed KaânicheVincent NicometteGuillaume AuriolPublished in: WISEC (2021)
Keyphrases
- cryptographic protocols
- security protocols
- secure routing
- denial of service attacks
- control system
- lightweight
- mobile phone
- cryptographic algorithms
- mobile devices
- closed loop
- attack scenarios
- security threats
- wifi
- neural network
- mobile applications
- countermeasures
- tcp ip
- short range
- pid controller
- authentication protocol
- mobile terminals
- watermarking scheme
- cellular phone
- intrusion detection system
- real time
- standard model
- fuzzy controller
- long range
- traffic analysis
- control law
- daily life