{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T06:55:17Z","timestamp":1764053717628,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry of Education and Research"},{"name":"Hessen State Ministry for Higher Education, Research and the Arts"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1145\/3448300.3467822","type":"proceedings-article","created":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T14:57:40Z","timestamp":1624546660000},"page":"72-77","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Happy MitM"],"prefix":"10.1145","author":[{"given":"Jiska","family":"Classen","sequence":"first","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Adafruit. 2021. Mini Bluetooth Keyboard - Black. https:\/\/www.adafruit.com\/product\/3601.  Adafruit. 2021. Mini Bluetooth Keyboard - Black. https:\/\/www.adafruit.com\/product\/3601."},{"key":"e_1_3_2_1_2_1","unstructured":"Android Open Source Project. 2021. hci_layer.cc. https:\/\/android.googlesource.com\/platform\/system\/bt\/+\/refs\/heads\/master\/hci\/src\/hci_layer.cc.  Android Open Source Project. 2021. hci_layer.cc. https:\/\/android.googlesource.com\/platform\/system\/bt\/+\/refs\/heads\/master\/hci\/src\/hci_layer.cc."},{"key":"e_1_3_2_1_3_1","volume-title":"BIAS: Bluetooth Impersonation AttackS. In IEEE Symposium on Security and Privacy (S&P).","author":"Antonioli Daniele","year":"2020","unstructured":"Daniele Antonioli , Nils Ole Tippenhauer , and Kasper Rasmussen . 2020 . BIAS: Bluetooth Impersonation AttackS. In IEEE Symposium on Security and Privacy (S&P). Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen. 2020. BIAS: Bluetooth Impersonation AttackS. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_4_1","volume-title":"Kasper Rasmussen, and Mathias Payer.","author":"Antonioli Daniele","year":"2020","unstructured":"Daniele Antonioli , Nils Ole Tippenhauer , Kasper Rasmussen, and Mathias Payer. 2020 . BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy . Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen, and Mathias Payer. 2020. BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy."},{"volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Antonioli Daniele","key":"e_1_3_2_1_5_1","unstructured":"Daniele Antonioli , Nils Ole Tippenhauer , and Kasper B. Rasmussen . 2019. The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR\/EDR. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/antonioli . In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA, 1047--1061. Daniele Antonioli, Nils Ole Tippenhauer, and Kasper B. Rasmussen. 2019. The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR\/EDR. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/antonioli. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1047--1061."},{"key":"e_1_3_2_1_6_1","unstructured":"Eli Biham and Lior Neumann. 2018. Breaking the Bluetooth Pairing: Fixed Coordinate Invalid Curve Attack. http:\/\/www.cs.technion.ac.il\/~biham\/BT\/bt-fixed-coordinate-invalid-curve-attack.pdf.  Eli Biham and Lior Neumann. 2018. Breaking the Bluetooth Pairing: Fixed Coordinate Invalid Curve Attack. http:\/\/www.cs.technion.ac.il\/~biham\/BT\/bt-fixed-coordinate-invalid-curve-attack.pdf."},{"key":"e_1_3_2_1_7_1","unstructured":"Bluetooth SIG. 2020. Bluetooth Core Specification 5.2. https:\/\/www.bluetooth.com\/specifications\/bluetooth-core-specification.  Bluetooth SIG. 2020. Bluetooth Core Specification 5.2. https:\/\/www.bluetooth.com\/specifications\/bluetooth-core-specification."},{"key":"e_1_3_2_1_8_1","unstructured":"BlueZ Project. 2021. BlueZ - Official Linux Bluetooth Protocol Stack. http:\/\/www.bluez.org\/.  BlueZ Project. 2021. BlueZ - Official Linux Bluetooth Protocol Stack. http:\/\/www.bluez.org\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Damien Cauquil. 2021. BtleJack: a new Bluetooth Low Energy swiss-army knife. https:\/\/github.com\/virtualabs\/btlejack.  Damien Cauquil. 2021. BtleJack: a new Bluetooth Low Energy swiss-army knife. https:\/\/github.com\/virtualabs\/btlejack."},{"key":"e_1_3_2_1_10_1","volume-title":"Formal Analysis of Authentication in Bluetooth Device Pairing. FCS-ARSPA07 45","author":"Chang Richard","year":"2007","unstructured":"Richard Chang and Vitaly Shmatikov . 2007. Formal Analysis of Authentication in Bluetooth Device Pairing. FCS-ARSPA07 45 ( 2007 ). Richard Chang and Vitaly Shmatikov. 2007. Formal Analysis of Authentication in Bluetooth Device Pairing. FCS-ARSPA07 45 (2007)."},{"key":"e_1_3_2_1_11_1","volume-title":"BlueMirror: Reflections on Bluetooth Pairing and Provisioning Protocols. In 15th IEEE Workshop on Offensive Technologies (WOOT 21)","author":"Claverie Tristan","year":"2021","unstructured":"Tristan Claverie and Jos\u00e9 Lopes . 2021 . BlueMirror: Reflections on Bluetooth Pairing and Provisioning Protocols. In 15th IEEE Workshop on Offensive Technologies (WOOT 21) . Tristan Claverie and Jos\u00e9 Lopes. 2021. BlueMirror: Reflections on Bluetooth Pairing and Provisioning Protocols. In 15th IEEE Workshop on Offensive Technologies (WOOT 21)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00091"},{"key":"e_1_3_2_1_13_1","unstructured":"Google Developers. 2021. Google Fast Pair Service. https:\/\/developers.google.com\/nearby\/fast-pair\/spec.  Google Developers. 2021. Google Fast Pair Service. https:\/\/developers.google.com\/nearby\/fast-pair\/spec."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399343"},{"key":"e_1_3_2_1_15_1","unstructured":"Hex-Rays. 2021. IDA Pro. https:\/\/www.hex-rays.com\/products\/ida\/.  Hex-Rays. 2021. IDA Pro. https:\/\/www.hex-rays.com\/products\/ida\/."},{"key":"e_1_3_2_1_16_1","volume-title":"3rd IEEE\/IFIP International Conference in Central Asia on Internet. IEEE.","author":"Hypponen Konstantin","year":"2007","unstructured":"Konstantin Hypponen and Keijo MJ Haataja . 2007 . \" Nino\" Man-in-the-Middle Attack on Bluetooth Secure Simple Sairing . In 3rd IEEE\/IFIP International Conference in Central Asia on Internet. IEEE. Konstantin Hypponen and Keijo MJ Haataja. 2007. \"Nino\" Man-in-the-Middle Attack on Bluetooth Secure Simple Sairing. In 3rd IEEE\/IFIP International Conference in Central Asia on Internet. IEEE."},{"key":"e_1_3_2_1_17_1","unstructured":"Kim Jong Cracks. 2020. checkra1n---iPhone 5s - iPhone X iOS 12.3 and up. https:\/\/checkra.in\/.  Kim Jong Cracks. 2020. checkra1n---iPhone 5s - iPhone X iOS 12.3 and up. https:\/\/checkra.in\/."},{"key":"e_1_3_2_1_18_1","unstructured":"Linux Kernel Source Tree. 2021. \/net\/bluetooth in the Linux 5.12-rc3 Kernel. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/tree\/net\/bluetooth?h=v5.12-rc3.  Linux Kernel Source Tree. 2021. \/net\/bluetooth in the Linux 5.12-rc3 Kernel. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/tree\/net\/bluetooth?h=v5.12-rc3."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326089"},{"key":"e_1_3_2_1_20_1","unstructured":"Nordic Semiconductor. 2021. nRF Connect for Mobile. https:\/\/www.nordicsemi.com\/Software-and-tools\/Development-Tools\/nRF-Connect-for-mobile.  Nordic Semiconductor. 2021. nRF Connect for Mobile. https:\/\/www.nordicsemi.com\/Software-and-tools\/Development-Tools\/nRF-Connect-for-mobile."},{"key":"e_1_3_2_1_21_1","unstructured":"Ole Andr\u00e9 V. Ravn\u00e5s. 2021. Frida - A world-class dynamic instrumentation framework. https:\/\/frida.re\/.  Ole Andr\u00e9 V. Ravn\u00e5s. 2021. Frida - A world-class dynamic instrumentation framework. https:\/\/frida.re\/."},{"key":"e_1_3_2_1_22_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Ruge Jan","year":"2020","unstructured":"Jan Ruge , Jiska Classen , Francesco Gringoli , and Matthias Hollick . 2020 . Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets . In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, 19--36. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/ruge Jan Ruge, Jiska Classen, Francesco Gringoli, and Matthias Hollick. 2020. Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 19--36. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/ruge"},{"key":"e_1_3_2_1_23_1","volume-title":"Bluetooth: With Low Energy Comes Low Security. In 7th USENIX Workshop on Offensive Technologies (WOOT 13)","author":"Ryan Mike","year":"2013","unstructured":"Mike Ryan . 2013 . Bluetooth: With Low Energy Comes Low Security. In 7th USENIX Workshop on Offensive Technologies (WOOT 13) . https:\/\/www.usenix.org\/system\/files\/conference\/woot13\/woot13-ryan.pdf Mike Ryan. 2013. Bluetooth: With Low Energy Comes Low Security. In 7th USENIX Workshop on Offensive Technologies (WOOT 13). https:\/\/www.usenix.org\/system\/files\/conference\/woot13\/woot13-ryan.pdf"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services. ACM.","author":"Wool Yaniv","year":"2005","unstructured":"Shaked, Yaniv and Wool , Avishai. 2005 . Cracking the Bluetooth PIN . In Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services. ACM. Shaked, Yaniv and Wool, Avishai. 2005. Cracking the Bluetooth PIN. In Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services. ACM."},{"key":"e_1_3_2_1_25_1","volume-title":"14th USENIX Workshop on Offensive Technologies (WOOT 20)","author":"Tillmanns J\u00f6rn","year":"2020","unstructured":"J\u00f6rn Tillmanns , Jiska Classen , Felix Rohrbach , and Matthias Hollick . 2020 . Firmware Insider: Bluetooth Randomness is Mostly Random . In 14th USENIX Workshop on Offensive Technologies (WOOT 20) . USENIX Association. https:\/\/www.usenix.org\/conference\/woot20\/presentation\/tillmanns J\u00f6rn Tillmanns, Jiska Classen, Felix Rohrbach, and Matthias Hollick. 2020. Firmware Insider: Bluetooth Randomness is Mostly Random. In 14th USENIX Workshop on Offensive Technologies (WOOT 20). USENIX Association. https:\/\/www.usenix.org\/conference\/woot20\/presentation\/tillmanns"},{"key":"e_1_3_2_1_26_1","volume-title":"Method Confusion Attack on Bluetooth Pairing. In IEEE Symposium on Security and Privacy (S&P). IEEE Computer Society","author":"von Tschirschnitz Maximilian","year":"2021","unstructured":"Maximilian von Tschirschnitz , Ludwig Peuckert , Fabian Franzen , and Jens Grossklags . 2021 . Method Confusion Attack on Bluetooth Pairing. In IEEE Symposium on Security and Privacy (S&P). IEEE Computer Society , Los Alamitos, CA, USA, 213--228. Maximilian von Tschirschnitz, Ludwig Peuckert, Fabian Franzen, and Jens Grossklags. 2021. Method Confusion Attack on Bluetooth Pairing. In IEEE Symposium on Security and Privacy (S&P). IEEE Computer Society, Los Alamitos, CA, USA, 213--228."},{"key":"e_1_3_2_1_27_1","unstructured":"zynamics. 2021. BinDiff. https:\/\/www.zynamics.com\/bindiff.html.  zynamics. 2021. BinDiff. https:\/\/www.zynamics.com\/bindiff.html."}],"event":{"name":"WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Abu Dhabi United Arab Emirates","acronym":"WiSec '21"},"container-title":["Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448300.3467822","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448300.3467822","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:41Z","timestamp":1750193261000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448300.3467822"}},"subtitle":["fun and toys in every bluetooth device"],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":27,"alternative-id":["10.1145\/3448300.3467822","10.1145\/3448300"],"URL":"https:\/\/doi.org\/10.1145\/3448300.3467822","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]},"assertion":[{"value":"2021-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}