Ma et al., 2007 - Google Patents
Keystroke Logging of a Wireless KeyboardMa et al., 2007
View PDF- Document ID
- 2115950313680271906
- Author
- Ma W
- Mbugua A
- Poon D
- Publication year
- Publication venue
- URL: http://courses. ece. ubc. ca/eece412/term_project/reports/2007/keylogging_of_bluetoooth_keyboard. pdf/(date of request: 17.01. 2015)
External Links
Snippet
This paper investigates the security of Bluetooth. We detail the vulnerability of Bluetooth keyboards to keystroke logging. We demonstrate the feasibility of sniffing Bluetooth transmissions, and give a recorded key pairing, we show that cracking is possible. We also …
- 238000005336 cracking 0 abstract description 7
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Barua et al. | Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey | |
Haataja et al. | Man-in-the-middle attacks on bluetooth: a comparative analysis, a novel attack, and countermeasures | |
Antonioli et al. | The {KNOB} is broken: Exploiting low entropy in the encryption key negotiation of bluetooth {BR/EDR} | |
Minar et al. | Bluetooth security threats and solutions: a survey | |
Haataja et al. | Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures | |
Cope et al. | An investigation of Bluetooth security vulnerabilities | |
US8429405B2 (en) | System and method for human assisted secure information exchange | |
Scarfone et al. | Guide to bluetooth security | |
Haataja et al. | Bluetooth security attacks: comparative analysis, attacks, and countermeasures | |
JP6396589B2 (en) | One-time credentials for secure automatic blue-two sparing | |
Dorobantu et al. | Security threats in IoT | |
Haataja et al. | Practical man-in-the-middle attacks against bluetooth secure simple pairing | |
Akestoridis et al. | On the security of thread networks: Experimentation with openthread-enabled devices | |
Willingham et al. | Testing vulnerabilities in bluetooth low energy | |
Becker et al. | Bluetooth security & hacks | |
Panse et al. | A review on security mechanism of Bluetooth communication | |
Haataja | New efficient intrusion detection and prevention system for Bluetooth networks. | |
Lamm et al. | Bluetooth wireless networks security features | |
Jain et al. | Penetration Testing of Wireless EncryptionProtocols | |
Ma et al. | Keystroke Logging of a Wireless Keyboard | |
Sharmila et al. | Notice of Violation of IEEE Publication Principles: Bluetooth Man-In-The-Middle Attack based on Secure Simple Pairing using Out Of Band Association Model | |
Haataja et al. | Ten years of bluetooth security attacks: Lessons learned | |
Saravanan et al. | A novel bluetooth man-in-the-middle attack based on SSP using OOB association model | |
Almomani et al. | Secure public key exchange against man-in-the-middle attacks during secure simple pairing (ssp) in bluetooth | |
Chen et al. | Security in Bluetooth networks and communications |