[HTML][HTML] Security of IoT application layer protocols: Challenges and findings

G Nebbione, MC Calzarossa - Future Internet, 2020 - mdpi.com
IoT technologies are becoming pervasive in public and private sectors and represent
presently an integral part of our daily life. The advantages offered by these technologies are …

[HTML][HTML] Wireless technologies for social distancing in the time of COVID-19: literature review, open issues, and limitations

SS Murad, S Yussof, R Badeel - Sensors, 2022 - mdpi.com
This research aims to provide a comprehensive background on social distancing as well as
effective technologies that can be used to facilitate the social distancing practice. Scenarios …

Internet-of-things security and vulnerabilities: Taxonomy, challenges, and practice

K Chen, S Zhang, Z Li, Y Zhang, Q Deng, S Ray… - Journal of Hardware and …, 2018 - Springer
Recent years have seen rapid development and deployment of Internet-of-Things (IoT)
applications in a diversity of application domains. This has resulted in creation of new …

A survey on dynamic mobile malware detection

P Yan, Z Yan - Software Quality Journal, 2018 - Springer
The outstanding advances of mobile devices stimulate their wide usage. Since mobile
devices are coupled with third-party applications, lots of security and privacy problems are …

Burglars' iot paradise: Understanding and mitigating security risks of general messaging protocols on iot clouds

Y Jia, L Xing, Y Mao, D Zhao, XF Wang… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
With the increasing popularity of the Internet of Things (IoT), many IoT cloud platforms have
emerged to help the IoT manufacturers connect their devices to their users. Serving the …

Who can find my devices? security and privacy of apple's crowd-sourced bluetooth location tracking system

A Heinrich, M Stute, T Kornhuber, M Hollick - arXiv preprint arXiv …, 2021 - arxiv.org
Overnight, Apple has turned its hundreds-of-million-device ecosystem into the world's
largest crowd-sourced location tracking network called offline finding (OF). OF leverages …

A billion open interfaces for eve and mallory:{MitM},{DoS}, and tracking attacks on {iOS} and {macOS} through apple wireless direct link

M Stute, S Narain, A Mariotto, A Heinrich… - 28th USENIX Security …, 2019 - usenix.org
Apple Wireless Direct Link (AWDL) is a key protocol in Apple's ecosystem used by over one
billion iOS and macOS devices for device-to-device communications. AWDL is a proprietary …

[PDF][PDF] Badbluetooth: Breaking android security mechanisms via malicious bluetooth peripherals.

F Xu, W Diao, Z Li, J Chen, K Zhang - NDSS, 2019 - staff.ie.cuhk.edu.hk
Bluetooth is a widely used communication technology, especially under the scenarios of
mobile computing and Internet of Things. Once paired with a host device, a Bluetooth device …

Disrupting continuity of apple's wireless ecosystem security: New tracking,{DoS}, and {MitM} attacks on {iOS} and {macOS} through bluetooth low energy,{AWDL}, and …

M Stute, A Heinrich, J Lorenz, M Hollick - 30th USENIX security …, 2021 - usenix.org
Apple controls one of the largest mobile ecosystems, with 1.5 billion active devices
worldwide, and offers twelve proprietary wireless Continuity services. Previous works have …

An automated contact tracing approach for controlling COVID-19 spread based on geolocation data from mobile cellular networks

MT Rahman, RT Khan, MRA Khandaker… - Ieee …, 2020 - ieeexplore.ieee.org
The coronavirus (COVID-19) has appeared as the greatest challenge due to its continuous
structural evolution as well as the absence of proper antidotes for this particular virus. The …