Read articles by tags
app attack authorization authorization timer authorizationresponse ble bluetooth classic bluetooth low energy bypass confudion crypto counter denial of service drop evil twin experiment extraction google information disclosure instructions j2me jsr 82 key keycard keydrop method nfc paper phonekey privilege escalation protobuf protocol protocol buffers range replay rfid security smartphone tempa tool vulnerability