Difference between revisions of "BIAS: Bluetooth Impersonation AttackS (Q4763)"
Jump to navigation
Jump to search
(Changed claim: official website (P15): https://github.com/francozappa/bias) |
(Created claim: quote (P203): For each of the 28 Blue-tooth chips tested, the table shows if the chip is vulnerable or not. Furthermore, all devices in the market using any of the vulnerable chips in this Table should be vulnerable to our BIAS attacks.) |
||
Property / quote | |||
+ | For each of the 28 Blue-tooth chips tested, the table shows if the chip is vulnerable or not. Furthermore, all devices in the market using any of the vulnerable chips in this Table should be vulnerable to our BIAS attacks. | ||
Property / quote: For each of the 28 Blue-tooth chips tested, the table shows if the chip is vulnerable or not. Furthermore, all devices in the market using any of the vulnerable chips in this Table should be vulnerable to our BIAS attacks. / rank | |||
+ | Normal rank |
Latest revision as of 17:59, 16 June 2020
scholarly article published in May 2020
Language | Label | Description | Also known as |
---|---|---|---|
English |
BIAS: Bluetooth Impersonation AttackS
|
scholarly article published in May 2020
|
Statements
0 references
21 May 2020
0 references
For each of the 28 Blue-tooth chips tested, the table shows if the chip is vulnerable or not. Furthermore, all devices in the market using any of the vulnerable chips in this Table should be vulnerable to our BIAS attacks.
0 references