Zhang et al., 2022 - Google Patents
When good becomes evil: Tracking bluetooth low energy devices via allowlist-based side channel and its countermeasureZhang et al., 2022
View PDF- Document ID
- 12705609809273719441
- Author
- Zhang Y
- Lin Z
- Publication year
- Publication venue
- Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
External Links
Snippet
Bluetooth Low Energy (BLE) is ubiquitous today. To prevent a BLE device (eg, a smartphone) from being connected by unknown devices, it uses allowlisting to allow the connectivity from only recognized devices. Unfortunately, we show that this allowlist feature …
- 230000002093 peripheral 0 abstract description 216
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zhang et al. | When good becomes evil: Tracking bluetooth low energy devices via allowlist-based side channel and its countermeasure | |
| Stute et al. | A billion open interfaces for eve and mallory:{MitM},{DoS}, and tracking attacks on {iOS} and {macOS} through apple wireless direct link | |
| Becker et al. | Tracking anonymized bluetooth devices | |
| US11102233B2 (en) | Detection of vulnerable devices in wireless networks | |
| Antonioli et al. | Blurtooth: Exploiting cross-transport key derivation in bluetooth classic and bluetooth low energy | |
| Zhang et al. | Breaking secure pairing of bluetooth low energy using downgrade attacks | |
| Zhao et al. | Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service | |
| CN106663162B (en) | Securely pairing computing devices | |
| US20250330816A1 (en) | Systems and methods for protecting bluetooth energy devices from address tracking | |
| CN108763876B (en) | A resource copyright verification method, device and device | |
| US11336621B2 (en) | WiFiwall | |
| Wu et al. | Sok: The long journey of exploiting and defending the legacy of king harald bluetooth | |
| Fuster et al. | Analysis of security and privacy issues in wearables for minors | |
| Willingham et al. | Testing vulnerabilities in bluetooth low energy | |
| Pacherkar et al. | PROV5GC: Hardening 5G core network security with attack detection and attribution based on provenance graphs | |
| Yu et al. | Security and Privacy Analysis of Samsung's {Crowd-Sourced} Bluetooth Location Tracking System | |
| CN106878992A (en) | Wireless network security detection method and system | |
| Gu et al. | Secure mobile cloud computing and security issues | |
| Chen et al. | Security analysis of device binding for IP-based IoT devices | |
| Zhang et al. | Breaking BLE MAC Address Randomization with Allowlist-Based Side Channels and its Countermeasure | |
| Celosia et al. | Detecting smartphone state changes through a Bluetooth based timing attack | |
| CN115379425B (en) | Bluetooth attack detection method, device, storage medium and mobile terminal | |
| Ellis et al. | Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation. | |
| Yang et al. | A novel authentication scheme against node captured attack in WSN for healthcare scene | |
| CN114389825A (en) | Data communication method based on block chain and related device |