[HTML][HTML] A survey on Bluetooth Low Energy security and privacy

M Cäsar, T Pawelke, J Steffan, G Terhorst - Computer Networks, 2022 - Elsevier
Since its introduction in 2009, Bluetooth Low Energy (BLE) has become a remarkable
success. Due to its unique properties of low power requirements and its ubiquitous …

Sok: The long journey of exploiting and defending the legacy of king harald bluetooth

J Wu, R Wu, D Xu, DJ Tian… - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Named after the Viking King Harald Bluetooth, Bluetooth is the de facto standard for short-
range wireless communications. The introduction of Bluetooth Low Energy (BLE) and Mesh …

Three years later: A study of mac address randomization in mobile devices and when it succeeds

E Fenske, D Brown, J Martin, T Mayberry… - Proceedings on …, 2021 - petsymposium.org
Mobile device manufacturers and operating system developers increasingly deploy MAC
address randomization to protect user privacy and prevent adversaries from tracking …

Evaluating physical-layer ble location tracking attacks on mobile devices

H Givehchian, N Bhaskar, ER Herrera… - … IEEE symposium on …, 2022 - ieeexplore.ieee.org
Mobile devices increasingly function as wireless tracking beacons. Using the Bluetooth Low
Energy (BLE) protocol, mobile devices such as smartphones and smartwatches …

When good becomes evil: Tracking bluetooth low energy devices via allowlist-based side channel and its countermeasure

Y Zhang, Z Lin - Proceedings of the 2022 ACM SIGSAC Conference on …, 2022 - dl.acm.org
Bluetooth Low Energy (BLE) is ubiquitous today. To prevent a BLE device (eg, a
smartphone) from being connected by unknown devices, it uses allowlisting to allow the …

Review on common IoT communication technologies for both long-range network (LPWAN) and short-range network

AA Bahashwan, M Anbar, N Abdullah… - Advances on Smart and …, 2021 - Springer
Abstract The Internet of Things refers to network of physical objects that use IP address for
Internet connectivity and to communicate with other Internet-enabled devices and systems …

Who can find my devices? security and privacy of apple's crowd-sourced bluetooth location tracking system

A Heinrich, M Stute, T Kornhuber, M Hollick - arXiv preprint arXiv …, 2021 - arxiv.org
Overnight, Apple has turned its hundreds-of-million-device ecosystem into the world's
largest crowd-sourced location tracking network called offline finding (OF). OF leverages …

AirGuard-protecting android users from stalking attacks by apple find my devices

A Heinrich, N Bittner, M Hollick - … of the 15th ACM Conference on …, 2022 - dl.acm.org
Finder networks in general, and Apple's Find My network in particular, can pose a grave
threat to users' privacy and even health if these networks are abused for stalking. Apple's …

Disrupting continuity of apple's wireless ecosystem security: New tracking,{DoS}, and {MitM} attacks on {iOS} and {macOS} through bluetooth low energy,{AWDL}, and …

M Stute, A Heinrich, J Lorenz, M Hollick - 30th USENIX security …, 2021 - usenix.org
Apple controls one of the largest mobile ecosystems, with 1.5 billion active devices
worldwide, and offers twelve proprietary wireless Continuity services. Previous works have …

{PrivateDrop}: Practical {Privacy-Preserving} Authentication for Apple {AirDrop}

A Heinrich, M Hollick, T Schneider, M Stute… - 30th USENIX Security …, 2021 - usenix.org
Apple's offline file-sharing service AirDrop is integrated into more than 1.5 billion end-user
devices worldwide. We discovered two design flaws in the underlying protocol that allow …