[go: up one dir, main page]

Zhang et al., 2022 - Google Patents

When good becomes evil: Tracking bluetooth low energy devices via allowlist-based side channel and its countermeasure

Zhang et al., 2022

View PDF
Document ID
12705609809273719441
Author
Zhang Y
Lin Z
Publication year
Publication venue
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security

External Links

Snippet

Bluetooth Low Energy (BLE) is ubiquitous today. To prevent a BLE device (eg, a smartphone) from being connected by unknown devices, it uses allowlisting to allow the connectivity from only recognized devices. Unfortunately, we show that this allowlist feature …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Zhang et al. When good becomes evil: Tracking bluetooth low energy devices via allowlist-based side channel and its countermeasure
Stute et al. A billion open interfaces for eve and mallory:{MitM},{DoS}, and tracking attacks on {iOS} and {macOS} through apple wireless direct link
Becker et al. Tracking anonymized bluetooth devices
US11102233B2 (en) Detection of vulnerable devices in wireless networks
Antonioli et al. Blurtooth: Exploiting cross-transport key derivation in bluetooth classic and bluetooth low energy
Zhang et al. Breaking secure pairing of bluetooth low energy using downgrade attacks
Zhao et al. Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service
CN106663162B (en) Securely pairing computing devices
US20250330816A1 (en) Systems and methods for protecting bluetooth energy devices from address tracking
CN108763876B (en) A resource copyright verification method, device and device
US11336621B2 (en) WiFiwall
Wu et al. Sok: The long journey of exploiting and defending the legacy of king harald bluetooth
Fuster et al. Analysis of security and privacy issues in wearables for minors
Willingham et al. Testing vulnerabilities in bluetooth low energy
Pacherkar et al. PROV5GC: Hardening 5G core network security with attack detection and attribution based on provenance graphs
Yu et al. Security and Privacy Analysis of Samsung's {Crowd-Sourced} Bluetooth Location Tracking System
CN106878992A (en) Wireless network security detection method and system
Gu et al. Secure mobile cloud computing and security issues
Chen et al. Security analysis of device binding for IP-based IoT devices
Zhang et al. Breaking BLE MAC Address Randomization with Allowlist-Based Side Channels and its Countermeasure
Celosia et al. Detecting smartphone state changes through a Bluetooth based timing attack
CN115379425B (en) Bluetooth attack detection method, device, storage medium and mobile terminal
Ellis et al. Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation.
Yang et al. A novel authentication scheme against node captured attack in WSN for healthcare scene
CN114389825A (en) Data communication method based on block chain and related device