ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2006.09809
  4. Cited By
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth
  Escalation Targets

Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets

17 June 2020
Jan Ruge
J. Classen
Francesco Gringoli
M. Hollick
ArXiv (abs)PDFHTML

Papers citing "Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets"

20 / 20 papers shown
ThreadFuzzer: Fuzzing Framework for Thread Protocol
ThreadFuzzer: Fuzzing Framework for Thread Protocol
Ilja Siros
Jakob Heirwegh
Dave Singelée
Bart Preneel
156
0
0
21 Nov 2025
Protocol-Aware Firmware Rehosting for Effective Fuzzing of Embedded Network Stacks
Protocol-Aware Firmware Rehosting for Effective Fuzzing of Embedded Network Stacks
Moritz Bley
Tobias Scharnowski
Simon Wörner
Moritz Schloegel
Thorsten Holz
189
0
0
17 Sep 2025
FlexEmu: Towards Flexible MCU Peripheral Emulation (Extended Version)
FlexEmu: Towards Flexible MCU Peripheral Emulation (Extended Version)
Chongqing Lei
Zhen Ling
Xiangyu Xu
Shaofeng Li
Guangchi Liu
Kai Dong
Junzhou Luo
113
1
0
09 Sep 2025
LLM-Assisted Model-Based Fuzzing of Protocol Implementations
LLM-Assisted Model-Based Fuzzing of Protocol Implementations
Changze Huang
Di Wang
Zhi Quan Zhou
182
2
0
03 Aug 2025
CovFUZZ: Coverage-based fuzzer for 4G&5G protocols
CovFUZZ: Coverage-based fuzzer for 4G&5G protocolsEuropean Symposium on Security and Privacy (EuroS&P), 2024
Ilja Siros
Dave Singelée
Bart Preneel
148
3
0
28 Oct 2024
BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low
  Energy
BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy
Xijia Che
Shengqi Dang
Xuewei Feng
Kun Sun
Ke Xu
Qi Li
112
13
0
28 May 2024
SoK: Prudent Evaluation Practices for Fuzzing
SoK: Prudent Evaluation Practices for FuzzingIEEE Symposium on Security and Privacy (S&P), 2024
Moritz Schloegel
Nils Bars
Nico Schiller
Lukas Bernhard
Tobias Scharnowski
Addison Crump
Arash Ale Ebrahim
N. Bissantz
Marius Muench
Thorsten Holz
290
67
0
16 May 2024
SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the
  Security of Arm Cortex-M Systems
SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems
Xi Tan
Zheyuan Ma
Sandro Pinto
Le Guan
Ning Zhang
Jun Xu
Zhiqiang Lin
Hongxin Hu
Ziming Zhao
294
21
0
27 Jan 2024
A Survey of Protocol Fuzzing
A Survey of Protocol FuzzingACM Computing Surveys (ACM CSUR), 2024
Xiaohan Zhang
Cen Zhang
Xinghua Li
Zhengjie Du
Yuekang Li
Yaowen Zheng
Yeting Li
Bing Mao
Yang Liu
Robert H. Deng
324
27
0
03 Jan 2024
AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis
AIM: Automatic Interrupt Modeling for Dynamic Firmware AnalysisIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2023
Bo Feng
Mengqing Luo
Changming Liu
Long Lu
E. Kirda
185
10
0
02 Dec 2023
MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive
  Firmware
MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive FirmwareConference on Computer and Communications Security (CCS), 2022
Zitai Chen
Sam L. Thomas
Flavio D. Garcia
128
11
0
06 Aug 2022
L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz
  Testing
L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz TestingDependable Systems and Networks (DSN), 2022
Haram Park
Carlos Nkuba Kayembe
Seunghoon Woo
Heejo Lee
109
21
0
30 Jul 2022
Evil Never Sleeps: When Wireless Malware Stays On After Turning Off
  iPhones
Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhonesWireless Network Security (WiSec), 2022
J. Classen
A. Heinrich
R. Reith
M. Hollick
174
10
0
12 May 2022
Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance
  Features for Inter-Chip Privilege Escalation
Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation
J. Classen
Francesco Gringoli
Michael Hermann
M. Hollick
119
16
0
10 Dec 2021
Nyx-Net: Network Fuzzing with Incremental Snapshots
Nyx-Net: Network Fuzzing with Incremental SnapshotsEuropean Conference on Computer Systems (EuroSys), 2021
Sergej Schumilo
Cornelius Aschermann
Andrea Jemmett
A. Abbasi
Thorsten Holz
194
95
0
04 Nov 2021
Happy MitM: Fun and Toys in Every Bluetooth Device
Happy MitM: Fun and Toys in Every Bluetooth Device
J. Classen
M. Hollick
90
9
0
16 Aug 2021
Automatic Firmware Emulation through Invalidity-guided Knowledge
  Inference (Extended Version)
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference (Extended Version)USENIX Security Symposium (USENIX Security), 2021
Wei Zhou
Le Guan
Yezhaohui Wang
Yuqing Zhang
256
76
0
16 Jul 2021
FastZIP: Faster and More Secure Zero-Interaction Pairing
FastZIP: Faster and More Secure Zero-Interaction PairingACM SIGMOBILE International Conference on Mobile Systems, Applications, and Services (MobiSys), 2021
Mikhail Fomichev
Julia Hesse
Lars Almon
Timm Lippert
Jun Han
M. Hollick
253
21
0
09 Jun 2021
Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices
Every Byte Matters: Traffic Analysis of Bluetooth Wearable DevicesProceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (IMWUT), 2021
Ludovic Barman
Alexandre Dumur
Apostolos Pyrgelis
Jean-Pierre Hubaux
172
14
0
24 May 2021
Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced
  Bluetooth Location Tracking System
Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking SystemProceedings on Privacy Enhancing Technologies (PoPETs), 2021
A. Heinrich
Milan Stute
T. Kornhuber
M. Hollick
60
52
0
03 Mar 2021
1
Page 1 of 1