From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices., и . CoRR, (2019)Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware., , , , и . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2 (1): 5:1-5:24 (2018)Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging., , , , , , , и . CoRR, (2021)Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation., , , и . CoRR, (2021)Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation., , , и . SP, стр. 1229-1245. IEEE, (2022)AirTag of the Clones: Shenanigans with Liberated Item Finders., , , и . SP (Workshops), стр. 301-311. IEEE, (2022)Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets., , , и . USENIX Security Symposium, стр. 19-36. USENIX Association, (2020)Practical VLC to WiFi Handover Mechanisms., , , , и . EWSN, стр. 324-329. ACM, (2019)Improving the Reliability of Bluetooth Low Energy Connections., , , , и . EWSN, стр. 144-155. ACM, (2020)Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem., , , и . WOOT @ USENIX Security Symposium, USENIX Association, (2019)