-
1
-
-
79955113060
-
-
[Online]. Available: [Accessed August 27, 2009]
-
Bluetooth SIG. Bluetooth Specifications 1.0-3.0+HS. [Online]. Available: http://www.bluetooth.com/Bluetooth/Technology/Building/Specifications. [Accessed August 27, 2009].
-
Bluetooth Specifications 1.0-3.0+HS
-
-
-
3
-
-
48749131952
-
-
[Online]. Available: [Accessed August 27, 2009]
-
H. Cheung, How To: Building a BlueSniper Rifle - Part 1. [Online]. Available: http://www.smallnetbuilder.com/content/view/24256/98. [Accessed August 27, 2009].
-
How To: Building a BlueSniper Rifle - Part 1
-
-
Cheung, H.1
-
4
-
-
48749131952
-
-
[Online]. Available: [Accessed August 27, 2009]
-
H. Cheung, How To: Building a BlueSniper Rifle - Part 2. [Online]. Available: http://www.smallnetbuilder.com/content/view/24228/98. [Accessed August 27, 2009].
-
How To: Building a BlueSniper Rifle - Part 2
-
-
Cheung, H.1
-
5
-
-
50049087174
-
-
[Online]. Available: [Accessed August 27, 2009]
-
M. Moser, Busting the Bluetooth Myth - Getting RAW Access. [Online]. Available: http://www.packetstormsecurity.org/papers/wireless/busting-bluetooth- myth.pdf. [Accessed August 27, 2009].
-
Busting the Bluetooth Myth - Getting RAW Access
-
-
Moser, M.1
-
6
-
-
74549171599
-
-
Ph.D. Dissertation, University of Kuopio, Department of Computer Science, February 6
-
K. Haataja, Security Threats and Countermeasures in Bluetooth-Enabled Systems, Ph.D. Dissertation, University of Kuopio, Department of Computer Science, February 6, 2009.
-
(2009)
Security Threats and Countermeasures in Bluetooth-Enabled Systems
-
-
Haataja, K.1
-
8
-
-
85084164108
-
BlueSniff - Eve meets Alice and Bluetooth
-
D. Spill and A. Bittau, "BlueSniff - Eve meets Alice and Bluetooth", in Proceedings of the First USENIX Workshop on Offensive Technologies, Boston, MA, August 6, 2007.
-
Proceedings of the First USENIX Workshop on Offensive Technologies, Boston, MA, August 6, 2007
-
-
Spill, D.1
Bittau, A.2
-
9
-
-
74549178603
-
-
[Online]. Available: [Accessed August 27, 2009]
-
D. Spill and A. Bittau, BlueSniff Source Codes. [Online]. Available: http://www.cs.ucl.ac.uk/staff/a.bittau/gr-bluetooth.tar.gz. [Accessed August 27, 2009].
-
BlueSniff Source Codes
-
-
Spill, D.1
Bittau, A.2
-
10
-
-
0003851399
-
-
2nd Edition, New York, Wiley & Sons
-
B. Schneier, Applied Cryptography - Protocols, Algorithms, and Source Code in C, 2nd Edition, New York, Wiley & Sons, 1996.
-
(1996)
Applied Cryptography - Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
11
-
-
84935078039
-
Security weaknesses in Bluetooth
-
Springer-Verlag
-
M. Jakobsson and S. Wetzel, "Security weaknesses in Bluetooth", Lecture Notes in Computer Science, vol. 2020, pp. 176-191, Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2020
, pp. 176-191
-
-
Jakobsson, M.1
Wetzel, S.2
-
12
-
-
31344471100
-
Man in the middle attacks on Bluetooth
-
Springer-Verlag
-
D. Kügler, "Man in the middle attacks on Bluetooth", Lecture Notes in Computer Science, vol. 2742, pp. 149-161, Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2742
, pp. 149-161
-
-
Kügler, D.1
-
13
-
-
35048863385
-
Relay Attacks on Bluetooth Authentication and Solutions
-
Springer-Verlag
-
A. Levi, E. Cetintas, M. Aydos, C. Koc, and M. Caglayan, "Relay Attacks on Bluetooth Authentication and Solutions", Lecture Notes in Computer Science, vol. 3280, pp. 278-288, Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3280
, pp. 278-288
-
-
Levi, A.1
Cetintas, E.2
Aydos, M.3
Koc, C.4
Caglayan, M.5
-
14
-
-
38149072454
-
Security Associations in Personal Networks: A Comparative Analysis
-
Springer-Verlag
-
J. Suomalainen, J. Valkonen, and N. Asokan, "Security Associations in Personal Networks: A Comparative Analysis", Lecture Notes in Computer Science, vol. 4572, pp. 43-57, Springer-Verlag, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4572
, pp. 43-57
-
-
Suomalainen, J.1
Valkonen, J.2
Asokan, N.3
-
15
-
-
48749083665
-
Niño Man-In-The-Middle Attack on Bluetooth Secure Simple Pairing
-
K. Hyppönen and K. Haataja, "Niño Man-In-The-Middle Attack on Bluetooth Secure Simple Pairing", in Proceedings of the IEEE Third International Conference in Central Asia on Internet, The Next Generation of Mobile, Wireless and Optical Communications Networks, Tashkent, Uzbekistan, September 26-28, 2007.
-
Proceedings of the IEEE Third International Conference in Central Asia on Internet, the next Generation of Mobile, Wireless and Optical Communications Networks, Tashkent, Uzbekistan, September 26-28, 2007
-
-
Hyppönen, K.1
Haataja, K.2
-
16
-
-
50649091323
-
Man-In-The-Middle Attacks on Bluetooth: A Comparative Analysis, a Novel Attack, and Countermeasures
-
K. Haataja and K. Hyppönen, "Man-In-The-Middle Attacks on Bluetooth: a Comparative Analysis, a Novel Attack, and Countermeasures", in Proceedings of the IEEE Third International Symposium on Communications, Control and Signal Processing, St. Julians, Malta, March 12-14, 2008.
-
Proceedings of the IEEE Third International Symposium on Communications, Control and Signal Processing, St. Julians, Malta, March 12-14, 2008
-
-
Haataja, K.1
Hyppönen, K.2
-
17
-
-
58049113593
-
Practical Man-In-The-Middle Attacks Against Bluetooth Secure Simple Pairing
-
K. Haataja and P. Toivanen, "Practical Man-In-The-Middle Attacks Against Bluetooth Secure Simple Pairing", in Proceedings of the 4th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, China, October 12-14, 2008.
-
Proceedings of the 4th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, China, October 12-14, 2008
-
-
Haataja, K.1
Toivanen, P.2
-
18
-
-
50049124688
-
-
[Online]. Available: [Accessed August 27, 2009]
-
J. Shandle, University Research Aims at More Secure Wi-Fi. [Online]. Available: http://www.eetimes.com/news/latest/showArticle.jhtml?articleID= 192501255. [Accessed August 27, 2009].
-
University Research Aims at More Secure Wi-Fi
-
-
Shandle, J.1
-
19
-
-
33748995703
-
Detecting Impersonation Attacks in Future Wireless and Mobile Networks
-
Springer-Verlag
-
M. Barbeau, J. Hall, and E. Kranakis, "Detecting Impersonation Attacks in Future Wireless and Mobile Networks", Lecture Notes in Computer Science, vol. 4074, pp. 80-95, Springer-Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4074
, pp. 80-95
-
-
Barbeau, M.1
Hall, J.2
Kranakis, E.3
-
20
-
-
85018108881
-
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting
-
J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. Randwyk, and D. Sicker, "Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting" , in Proceedings of the 15th USENIX Security Symposium, Vancouver, B.C., Canada, July 31-August 4, 2006.
-
Proceedings of the 15th USENIX Security Symposium, Vancouver, B.C., Canada, July 31-August 4, 2006
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Randwyk, J.5
Sicker, D.6
-
21
-
-
34249822230
-
Wireless Security Through RF Fingerprinting
-
O. Ureten and N. Serinken, "Wireless Security Through RF Fingerprinting", Canadian Journal of Electrical and Computer Engineering, vol. 32, no. 1, pp. 27-33, 2007.
-
(2007)
Canadian Journal of Electrical and Computer Engineering
, vol.32
, Issue.1
, pp. 27-33
-
-
Ureten, O.1
Serinken, N.2
-
22
-
-
0343349593
-
Bayesian Detection of Radio Transmitter Turn-On Transients
-
O. Ureten and N. Serinken, "Bayesian Detection of Radio Transmitter Turn-On Transients", in Proceedings of the IEEE Non Linear Signal and Image Processing Conference, Antalya, Turkey, June 1999, pp. 830-834.
-
Proceedings of the IEEE Non Linear Signal and Image Processing Conference, Antalya, Turkey, June 1999
, pp. 830-834
-
-
Ureten, O.1
Serinken, N.2
-
23
-
-
38049181728
-
Detecting Rogue Devices in Bluetooth Networks Using Radio Frequency Fingerprinting
-
J. Hall, M. Barbeau, and E. Kranakis, "Detecting Rogue Devices in Bluetooth Networks Using Radio Frequency Fingerprinting", in Proceedings of the IASTED International Conference on Communications and Computer Networks, Lima, Peru, October 4-6, 2006.
-
Proceedings of the IASTED International Conference on Communications and Computer Networks, Lima, Peru, October 4-6, 2006
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
24
-
-
51349157157
-
Implications of Radio Fingerprinting on the Security of Sensor Networks
-
K. Rasmussen and S. Capkun, "Implications of Radio Fingerprinting on the Security of Sensor Networks", in Proceedings of the IEEE 3rd International Conference on Security and Privacy in Communications Networks, Nice, France, September 17-20, 2007, pp. 331-340.
-
Proceedings of the IEEE 3rd International Conference on Security and Privacy in Communications Networks, Nice, France, September 17-20, 2007
, pp. 331-340
-
-
Rasmussen, K.1
Capkun, S.2
-
25
-
-
11144331561
-
Enhancing Intrusion Detection in Wireless Networks using Radio Frequency Fingerprinting
-
J. Hall, M. Barbeau, and E. Kranakis, "Enhancing Intrusion Detection in Wireless Networks using Radio Frequency Fingerprinting", in Proceedings of the 3rd IASTED International Conference on Communications, Internet and Information Technology, St. Thomas, U.S. Virgin Islands, November 2004, pp. 201-206.
-
Proceedings of the 3rd IASTED International Conference on Communications, Internet and Information Technology, St. Thomas, U.S. Virgin Islands, November 2004
, pp. 201-206
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
26
-
-
1542747838
-
Detection of Transient in Radio Frequency Fingerprinting Using Signal Phase
-
J. Hall, M. Barbeau, and E. Kranakis, "Detection of Transient in Radio Frequency Fingerprinting Using Signal Phase", in Proceedings of the IASTED International Conference on Wireless and Optical Communications, Banff, Canada, July 14-16, 2003, pp. 13-18.
-
Proceedings of the IASTED International Conference on Wireless and Optical Communications, Banff, Canada, July 14-16, 2003
, pp. 13-18
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
27
-
-
0029322622
-
An Introduction to Wavelets
-
A. Graps, "An Introduction to Wavelets", IEEE Computational Science & Engineering, vol. 2, no. 2, pp. 50-61, 1995.
-
(1995)
IEEE Computational Science & Engineering
, vol.2
, Issue.2
, pp. 50-61
-
-
Graps, A.1
-
29
-
-
0013379958
-
-
[Online]. Available: [Accessed August 27, 2009]
-
NIST/SEMATECH. E-Handbook of Statistical Methods. [Online]. Available: http://www.itl.nist.gov/div898/handbook. [Accessed August 27, 2009].
-
E-Handbook of Statistical Methods
-
-
-
30
-
-
0029461389
-
Transient Analysis and Genetic Algorithms for Classification
-
J. Toonstra and W. Kinsner, "Transient Analysis and Genetic Algorithms for Classification", in Proceedings of the IEEE Communications, Power, and Computing, vol. 2, 1995, pp. 432-437.
-
(1995)
Proceedings of the IEEE Communications, Power, and Computing
, vol.2
, pp. 432-437
-
-
Toonstra, J.1
Kinsner, W.2
-
32
-
-
0033365847
-
Self-Organizing Maps and Learning Vector Quantization for feature sequences
-
P. Somervuo and T. Kohonen, "Self-Organizing Maps and Learning Vector Quantization for Feature Sequences", Neural Processing Letters, vol. 10, no. 2, pp. 151-159, 1999. (Pubitemid 30503364)
-
(1999)
Neural Processing Letters
, vol.10
, Issue.2
, pp. 151-159
-
-
Somervuo, P.1
Kohonen, T.2
-
33
-
-
0030357161
-
Wavelet Based Transmitter Identification
-
R. Hippenstiel and Y. Payal, "Wavelet Based Transmitter Identification", in Proceedings of the International Symposium on Signal Processing and its Applications, Gold Coast, Australia, August 25-30, 1996.
-
Proceedings of the International Symposium on Signal Processing and Its Applications, Gold Coast, Australia, August 25-30, 1996
-
-
Hippenstiel, R.1
Payal, Y.2
-
36
-
-
60149092949
-
Wireless Device Identification with Radiometric Signatures
-
V. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless Device Identification with Radiometric Signatures", in Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, San Francisco, California, USA, September 14-19, 2008, pp. 116-127.
-
Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, San Francisco, California, USA, September 14-19, 2008
, pp. 116-127
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
37
-
-
56749098358
-
Identifying Unique Devices Through Wireless Fingerprinting
-
D. Loh, C. Cho, C. Tan, and R. Lee, "Identifying Unique Devices Through Wireless Fingerprinting", in Proceedings of the First ACM Conference on Wireless Network Security, Alexandria, Virginia, USA, March 31-April 2, 2008, pp. 46-55.
-
Proceedings of the First ACM Conference on Wireless Network Security, Alexandria, Virginia, USA, March 31-April 2, 2008
, pp. 46-55
-
-
Loh, D.1
Cho, C.2
Tan, C.3
Lee, R.4
-
38
-
-
77951755369
-
-
White Paper, Berliner Congress Center, Berlin, Germany, December 27-29
-
M. Herfurt and C. Mulliner, BluePrinting - Remote Device Identification based on Bluetooth Fingerprinting Techniques, White Paper, Berliner Congress Center, Berlin, Germany, December 27-29, 2004.
-
(2004)
BluePrinting - Remote Device Identification Based on Bluetooth Fingerprinting Techniques
-
-
Herfurt, M.1
Mulliner, C.2
-
39
-
-
77951754822
-
-
[Online]. Available: [Accessed August 27, 2009]
-
Trifinite, Trifinite.org - The Home for the Trifinite.group. [Online]. Available: http://trifinite.org. [Accessed August 27, 2009].
-
Trifinite.org - The Home for the Trifinite.group
-
-
-
40
-
-
77951715301
-
-
[Online]. Available: [Accessed August 27, 2009]
-
The Shmoo Group, Hacking, Moose, Crypto. [Online]. Available: http://www.shmoo.com. [Accessed August 27, 2009].
-
-
-
-
41
-
-
77951743509
-
-
[Online]. Available: [Accessed August 27, 2009]
-
SecuriTeam, BTScanner - Bluetooth Scanner. [Online]. Available: http://www.securiteam.com/tools/6I00P2A8KK.html. [Accessed August 27, 2009].
-
BTScanner - Bluetooth Scanner
-
-
-
42
-
-
51449120796
-
Mobile Device Profiling and Intrusion Detection Using Smart Batteries
-
T. Buennemeyer, T. Nelson, L. Clagett, J. Dunning, R. Marchany, and J. Tront, "Mobile Device Profiling and Intrusion Detection Using Smart Batteries", in Proceedings of the IEEE 41st Hawaii International Conference on System Sciences, Waikoloa, Big Island, Hawaii, January 7-10, 2008.
-
Proceedings of the IEEE 41st Hawaii International Conference on System Sciences, Waikoloa, Big Island, Hawaii, January 7-10, 2008
-
-
Buennemeyer, T.1
Nelson, T.2
Clagett, L.3
Dunning, J.4
Marchany, R.5
Tront, J.6
-
43
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Y. Zhang and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks", in Proceedings of the ACM 6th Annual International Conference on Mobile Computing and Networking, Boston, Massachusetts, USA, August 6-11, 2000, pp. 275-283. (Pubitemid 32024702)
-
(2000)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
44
-
-
84950162203
-
Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks
-
O. Kachirski and R. Guha, "Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks", in Proceedings of the IEEE Workshop on Knowledge Media Networking, CRL, Kyoto, Japan, July 10-12, 2002, pp. 153-158.
-
Proceedings of the IEEE Workshop on Knowledge Media Networking, CRL, Kyoto, Japan, July 10-12, 2002
, pp. 153-158
-
-
Kachirski, O.1
Guha, R.2
-
45
-
-
77951733949
-
New Efficient Intrusion Detection and Prevention System for Bluetooth Networks
-
K. Haataja, "New Efficient Intrusion Detection and Prevention System for Bluetooth Networks", in Proceedings of the ACM International Conference on Mobile, Wireless MiddleWare, Operating Systems, and Applications, Innsbruck, Austria, February 12-15, 2008.
-
Proceedings of the ACM International Conference on Mobile, Wireless MiddleWare, Operating Systems, and Applications, Innsbruck, Austria, February 12-15, 2008
-
-
Haataja, K.1
|