A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Cross-protocol attacks
2021
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
In this paper, we focus on a new type of wireless attacks, named cross-technology pivoting attacks. The main objective of these attacks is to divert the transceivers of compromised devices dedicated to a given protocol to allow them to communicate through another protocol, taking advantage of some similarities in their modulation schemes. The main contribution of this work consists in demonstrating the practical feasibility of pivoting attacks from off-the-shelf devices implementing the
doi:10.1145/3448300.3468258
fatcat:rvd4bkt7onfkne65gvncqyzvx4