1 |
T. Schroder and M. Moser, KeyKeriki v2.0 - 2.4 GHz(2010), Retrieved Oct., 28, 2016, from http://www.remote-exploit.org/articles/keykeriki_v2_0__8211_2_4ghz/.
|
2 |
T. Schroder and M. Moser, KeyKeriki v1.0 - 27 MHz(2009), Retrieved Oct., 28, 2016, from http://www.remote-exploit.org/articles/keykeriki_v1_0_-_27mhz/.
|
3 |
Travis Goodspeed, Promiscuity is the nRF24L 01+'s Duty(2011), Retrieved Oct., 28, 2016, from http://travisgoodspeed.blogspot.kr/2011/02/promiscuity-is-nrf24l01s-duty.html.
|
4 |
S. Kamkar, KeySweeper(2015), Retrieved Oct., 28, 2016, from http://samy.pl/keysweeper/
|
5 |
S. J. Lee, "Study about vulnerability to 2.4GHz wireless keyboard with Arduino," M.S. Thesis, Kookmin university, 2015.
|
6 |
Bastille Network, MouseJack(2016), Retrieved Oct., 28, 2016, from https://www.bastille.net/technical-details.
|
7 |
NIST, "Announcing the Advanced Encryption Standard(AES)," FIPS PUB-197, Nov. 2002.
|
8 |
Universal Serial Bus, HID Usage Tables, Oct. 2004.
|
9 |
H. Y. Kim, "Study on the electromagnetic signal analysis of 27MHz wireless keyboards," M.S. Thesis, Kookmin university, 2014.
|
10 |
H. Y. Kim, B. Y. Sim, A. S. Park, and D. G. Han, "Analysis of 27MHz wireless keyboard electromagnetic signal using USRP and GNU radio," J. Korea Inst. Inf. Security and Cryptol., vol. 26, no. 1, pp. 81-91, Feb. 2016.
DOI
|
11 |
M. Fahnle and M. Hauff, "Analysis of unencrypted and encrypted wireless keyboard transmission implemented in GNU radio based software-defined radio," Univ. of Appl. Sci. Inst. Commun. Technol., Hochschul Ulm, 2011.
|
12 |
S. J. Lee, A. S. Park, B. Y. Sim, S. S. Kim, S. S. Oh, and D. G. Han, "Building of remote control attack system for 2.4 GHz wireless keyboard using an android smart phone," J. Korea Inst. Inf. Security and Cryptol., vol. 26, no. 4, pp. 871-883, Aug. 2016.
DOI
|