Login / Signup
Exploiting a Contact Tracing App to Attack Neighboring Devices.
Jonah Fitzgerald
Thomas Mason
Brian Mulhair
William Glisson
Published in:
HICSS (2023)
Keyphrases
</>
mobile applications
mobile apps
mobile devices
embedded devices
countermeasures
mobile platforms
user experience
authentication protocol
data corruption
key exchange protocol