BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy. | 0 | 0.34 | 2022 |
Detection of Electromagnetic Signal Injection Attacks on Actuator Systems. | 0 | 0.34 | 2022 |
Extended Abstract - Covert Channels and Data Exfiltration From FPGAs. | 0 | 0.34 | 2021 |