Difference between revisions of "BIAS: Bluetooth Impersonation AttackS (Q4763)"

From Wikibase Personal data
Jump to navigation Jump to search
(‎Created a new Item: #quickstatements; #temporary_batch_1592329934222)
 
(‎Created claim: quote (P203): For each of the 28 Blue-tooth chips tested, the table shows if the chip is vulnerable or not. Furthermore, all devices in the market using any of the vulnerable chips in this Table should be vulnerable to our BIAS attacks.)
 
(6 intermediate revisions by the same user not shown)
Property / official website
 +
Property / official website: https://francozappa.github.io/about-bias/publication/antonioli-20-bias/antonioli-20-bias.pdf / rank
 +
Normal rank
Property / official website
 +
Property / official website: https://github.com/francozappa/bias / rank
 +
Normal rank
Property / official website: https://github.com/francozappa/bias / qualifier
 +
comment: tool kit
Property / date
 +
21 May 2020
Timestamp+2020-05-21T00:00:00Z
Timezone+00:00
CalendarGregorian
Precision1 day
Before0
After0
Property / date: 21 May 2020 / rank
 +
Normal rank
Property / concerns
 +
Property / concerns: Bluetooth Low Energy / rank
 +
Normal rank
Property / concerns
 +
Property / concerns: Coronadata / rank
 +
Normal rank
Property / quote
 +
For each of the 28 Blue-tooth chips tested, the table shows if the chip is vulnerable or not. Furthermore, all devices in the market using any of the vulnerable chips in this Table should be vulnerable to our BIAS attacks.
Property / quote: For each of the 28 Blue-tooth chips tested, the table shows if the chip is vulnerable or not. Furthermore, all devices in the market using any of the vulnerable chips in this Table should be vulnerable to our BIAS attacks. / rank
 +
Normal rank

Latest revision as of 17:59, 16 June 2020

scholarly article published in May 2020
Language Label Description Also known as
English
BIAS: Bluetooth Impersonation AttackS
scholarly article published in May 2020

    Statements

    21 May 2020
    0 references
    0 references
    0 references
    For each of the 28 Blue-tooth chips tested, the table shows if the chip is vulnerable or not. Furthermore, all devices in the market using any of the vulnerable chips in this Table should be vulnerable to our BIAS attacks.
    0 references