Tags
android app attack auditing authorization ble bluetooth-classic bluetooth-low-energy bypass cloning crypto-counter denial-of-service drop experiment google hardware improvement information-disclosure instructions j2me jsr-82 method paak palm-os paper phonekey privacy privilege-escalation protocol range replay rfid security smartphone tempa tempara tesla tool vcsec vulnerability