Essays about: "key Bluetooth"

Showing result 1 - 5 of 28 essays containing the words key Bluetooth.

  1. 1. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Afruz Bakhshiyeva; Gabriel Berefelt; [2022]
    Keywords : Connected vehicle; hacking; pentest; eavesdropping; security; Tesla Model 3; Volvo XC40; MG Marvel R; automotive cybersecurity; interception attacks; passive attacks; wireless attacks; Wi-Fi attacks; attack surface; relay attack; port scan; man-in-the-middle attack; Uppkopplade fordon; hacking; avlyssning; säkerhet; Tesla Model 3; Volvo XC40; MG Marvel R; fordonscybersäkerhet; avlyssningsattacker; passiva attacker; trådlösa attacker; Wi-Fi-attacker; attackyta; relä-attack; port-skanning; mannen-i-mitten attack;

    Abstract : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. READ MORE

  2. 2. Analysis of radio surveillance in search of missing persons - An empirical study of Bluetooth Low Energy and Wi-Fi characteristics

    University essay from Linköpings universitet/Kommunikations- och transportsystem; Linköpings universitet/Tekniska fakulteten

    Author : Mikael Fredriksson; [2022]
    Keywords : Search and rescue; Wi-Fi; Bluetooth Low Energy; Wi-Fi probes; Bluetooth Low Energy advertisements; wireless sniffing; smartphones; antenna directivity;

    Abstract : Development of technical and methodological support has been identified as a key area for future research and development within the search and rescue (SAR) of missing persons in Sweden. Previous studies have demonstrated the feasibility of using Wi-Fi signals to locate a missing person, and also developed hardware and software for SAR systems based around Unmanned Aerial Vehicles (UAV). READ MORE

  3. 3. Improving deep learning assistedfar-field electromagnetic sidechannelattacks on AES : Effects on attack efficiency from using additive noise and otherdata augmentation techniques

    University essay from KTH/Mekatronik

    Author : Axel Zedigh; [2022]
    Keywords : ;

    Abstract : Profiled side-channel attacks on hardware implemented cryptographic algorithms have been a well-researched topic for the past two decades and many countermeasures against these attacks have been proposed and adopted by the industry. Recently, a new form of far field EM side channel called "screaming channel attacks" have been highlighted. READ MORE

  4. 4. An Efficiency Evaluation of Far-Field Electromagnetic Deep Learning Side-Channel Attacks in Controlled Environments

    University essay from Uppsala universitet/Signaler och system

    Author : Gabriel Evensen; [2022]
    Keywords : SCA; DL-SCA; Side-Channel Attacks; Deep Learning Side-Channel Attacks; Far-Field Side-Channel Attacks;

    Abstract : As more and more modern systems and products use built-in microcontrollers, hardware security becomes more important to protect against cyber-attacks. Internet of things devices, like Bluetooth devices, usually use an encryption algorithm to keep data safe from hackers. Advanced Encryption Standard (AES) is a commonly used encryption algorithm. READ MORE

  5. 5. Advanced Side-Channel Analysis of USIMs, Bluetooth SoCs and MCUs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Martin Brisfors; [2021]
    Keywords : Side Channel Attack; Deep Learning; AES; USIM; Milenage; Screaming Channels; Transformer; Security; Sidokanalsattack; Djupinlärning; AES; USIM; Milenage; Screaming Channels; Transformer; Säkerhet;

    Abstract : The use of deep learning for side channel analysis has shown a lot of success in recent years. Impressive results have been presented by many researchers. However, critics of this approach have voiced concerns about the ad hoc methodologies and bespoke neural network designs used in many presented approaches. READ MORE