Read articles by tags
android attack authorization authorization timer authorizationresponse ble bluetooth classic bluetooth low energy bypass cloning confudion crypto counter denial of service evil twin extraction hardware improvement information disclosure instructions j2me key deletion keycard method nfc paak palm os paper phonekey privacy privilege escalation proto protobuf replay rfid smartphone tempara tool tuning vcsec vulnerability