A billion open interfaces for eve and mallory:{MitM},{DoS}, and tracking attacks on {iOS} and {macOS} through apple wireless direct link M Stute, S Narain, A Mariotto, A Heinrich, D Kreitschmann, G Noubir, ... 28th USENIX Security Symposium (USENIX Security 19), 37-54, 2019 | 61 | 2019 |
Who can find my devices? security and privacy of apple's crowd-sourced bluetooth location tracking system A Heinrich, M Stute, T Kornhuber, M Hollick Proceedings on Privacy Enhancing Technologies, 227-245, 2021 | 40 | 2021 |
Ghost Peak: Practical Distance Reduction Attacks Against {HRP}{UWB} Ranging P Leu, G Camurati, A Heinrich, M Roeschlin, C Anliker, M Hollick, ... 31st USENIX Security Symposium (USENIX Security 22), 1343-1359, 2022 | 28 | 2022 |
Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi M Stute, A Heinrich, J Lorenz, M Hollick 30th USENIX Security Symposium (USENIX Security 21), 3917-3934, 2021 | 26 | 2021 |
AirGuard: Protecting Android Users from Stalking Attacks by Apple Find My Devices A Heinrich, N Bittner, M Hollick Proceedings of the 15th ACM Conference on Security and Privacy in Wireless …, 2022 | 23 | 2022 |
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop A Heinrich, M Hollick, T Schneider, M Stute, C Weinert 30th USENIX Security Symposium (USENIX Security 21), 3577-3594, 2021 | 23 | 2021 |
OpenHaystack: a framework for tracking personal bluetooth devices via Apple's massive find my network A Heinrich, M Stute, M Hollick Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 17 | 2021 |
BTLEmap: Nmap for bluetooth low energy A Heinrich, M Stute, M Hollick Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 11 | 2020 |
Evil never sleeps: When wireless malware stays on after turning off iphones J Classen, A Heinrich, R Reith, M Hollick Proceedings of the 15th ACM Conference on Security and Privacy in Wireless …, 2022 | 8 | 2022 |
Smartphones with UWB: Evaluating the accuracy and reliability of UWB ranging A Heinrich, S Krollmann, F Putz, M Hollick arXiv preprint arXiv:2303.11220, 2023 | 7 | 2023 |
Wibbly Wobbly, Timey Wimey–What’s Really Inside Apple’s U1 Chip J Classen, A Heinrich Presentation at Black Hat USA, 2021 | 6 | 2021 |
OpenHaystack Mobile-Tracking Custom Find My Accessories on Smartphones L Burg, M Granzow, A Heinrich, M Hollick Proceedings of the 15th ACM Conference on Security and Privacy in Wireless …, 2022 | 3 | 2022 |
Datensicherheit von Corona-Apps nach der DSGVO T Grube, A Heinrich, JP Stroscher, S Schomberg Datenschutz und Datensicherheit-DuD 44 (8), 501-505, 2020 | 2 | 2020 |
AirCollect: Efficiently recovering hashed phone numbers leaked via Apple AirDrop A Heinrich, M Hollick, T Schneider, M Stute, C Weinert Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 1 | 2021 |
Poster: Leveraging Apple's Find My Network for Large-Scale Distributed Sensing M Granzow, A Heinrich, M Hollick, M Zimmerling Proceedings of the 22nd Annual International Conference on Mobile Systems …, 2024 | | 2024 |
Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection A Heinrich, L Würsching, M Hollick Proceedings on Privacy Enhancing Technologies, 2024 | | 2024 |
A Billion Open Houses for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link A Mariotto, A Heinrich, D Kreitschmann, G Noubir, M Hollick Proceedings of the 28th USENIX Security Symposium, 2019 | | 2019 |