[go: up one dir, main page]

Ma et al., 2007 - Google Patents

Keystroke Logging of a Wireless Keyboard

Ma et al., 2007

View PDF
Document ID
2115950313680271906
Author
Ma W
Mbugua A
Poon D
Publication year
Publication venue
URL: http://courses. ece. ubc. ca/eece412/term_project/reports/2007/keylogging_of_bluetoooth_keyboard. pdf/(date of request: 17.01. 2015)

External Links

Snippet

This paper investigates the security of Bluetooth. We detail the vulnerability of Bluetooth keyboards to keystroke logging. We demonstrate the feasibility of sniffing Bluetooth transmissions, and give a recorded key pairing, we show that cracking is possible. We also …
Continue reading at courses.ece.ubc.ca (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Barua et al. Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey
Haataja et al. Man-in-the-middle attacks on bluetooth: a comparative analysis, a novel attack, and countermeasures
Antonioli et al. The {KNOB} is broken: Exploiting low entropy in the encryption key negotiation of bluetooth {BR/EDR}
Minar et al. Bluetooth security threats and solutions: a survey
Haataja et al. Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures
Cope et al. An investigation of Bluetooth security vulnerabilities
US8429405B2 (en) System and method for human assisted secure information exchange
Scarfone et al. Guide to bluetooth security
Haataja et al. Bluetooth security attacks: comparative analysis, attacks, and countermeasures
JP6396589B2 (en) One-time credentials for secure automatic blue-two sparing
Dorobantu et al. Security threats in IoT
Haataja et al. Practical man-in-the-middle attacks against bluetooth secure simple pairing
Akestoridis et al. On the security of thread networks: Experimentation with openthread-enabled devices
Willingham et al. Testing vulnerabilities in bluetooth low energy
Becker et al. Bluetooth security & hacks
Panse et al. A review on security mechanism of Bluetooth communication
Haataja New efficient intrusion detection and prevention system for Bluetooth networks.
Lamm et al. Bluetooth wireless networks security features
Jain et al. Penetration Testing of Wireless EncryptionProtocols
Ma et al. Keystroke Logging of a Wireless Keyboard
Sharmila et al. Notice of Violation of IEEE Publication Principles: Bluetooth Man-In-The-Middle Attack based on Secure Simple Pairing using Out Of Band Association Model
Haataja et al. Ten years of bluetooth security attacks: Lessons learned
Saravanan et al. A novel bluetooth man-in-the-middle attack based on SSP using OOB association model
Almomani et al. Secure public key exchange against man-in-the-middle attacks during secure simple pairing (ssp) in bluetooth
Chen et al. Security in Bluetooth networks and communications