{"_id":"J3h5zgS2gKv4vijdH","bibbaseid":"anonymous-badbluetoothbreakingandroidsecuritymechanismsviamaliciousbluetoothperipherals","bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"BadBluetooth: Breaking Android SecurityMechanisms via Malicious Bluetooth Peripherals","bibtex":"@inproceedings{noauthor_badbluetooth:_nodate,\n\ttitle = {{BadBluetooth}: {Breaking} {Android} {SecurityMechanisms} via {Malicious} {Bluetooth} {Peripherals}},\n}\n\n","key":"noauthor_badbluetooth:_nodate","id":"noauthor_badbluetooth:_nodate","bibbaseid":"anonymous-badbluetoothbreakingandroidsecuritymechanismsviamaliciousbluetoothperipherals","role":"","urls":{},"metadata":{"authorlinks":{}},"html":""},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/KPvyuqsSSM9LXmmGy","dataSources":["L4wuGMBYhquxErcXE"],"keywords":[],"search_terms":["badbluetooth","breaking","android","securitymechanisms","via","malicious","bluetooth","peripherals"],"title":"BadBluetooth: Breaking Android SecurityMechanisms via Malicious Bluetooth Peripherals","year":null}