Search Results for author: Jiska Classen

Found 2 papers, 1 papers with code

Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets

no code implementations17 Jun 2020 Jan Ruge, Jiska Classen, Francesco Gringoli, Matthias Hollick

Wireless communication standards and implementations have a troubled history regarding security.

Cryptography and Security Networking and Internet Architecture

Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit

1 code implementation28 Jun 2017 Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti

In this paper, we provide an in-depth security analysis of the operation of fitness trackers commercialized by Fitbit, the wearables market leader.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.