BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals.
Fenghao XuWenrui DiaoZhou LiJiongyi ChenKehuan ZhangPublished in: NDSS (2019)
Keyphrases
- security mechanisms
- wifi
- smart card
- mobile devices
- security issues
- resource constrained
- mobile phone
- access control
- security systems
- detect malicious
- security problems
- security requirements
- operating system
- smart phones
- end to end
- wireless networks
- digital signature
- mobile applications
- security services
- wireless communication
- ubiquitous computing
- security protocols
- payment systems
- cryptographic algorithms
- security architecture
- public key infrastructure
- databases
- wireless sensor networks
- malware detection
- security policies
- ad hoc networks
- information security
- software architecture
- data sets