Security of IoT application layer protocols: Challenges and findings
IoT technologies are becoming pervasive in public and private sectors and represent
presently an integral part of our daily life. The advantages offered by these technologies are …
presently an integral part of our daily life. The advantages offered by these technologies are …
Wireless technologies for social distancing in the time of COVID-19: literature review, open issues, and limitations
This research aims to provide a comprehensive background on social distancing as well as
effective technologies that can be used to facilitate the social distancing practice. Scenarios …
effective technologies that can be used to facilitate the social distancing practice. Scenarios …
Internet-of-things security and vulnerabilities: Taxonomy, challenges, and practice
Recent years have seen rapid development and deployment of Internet-of-Things (IoT)
applications in a diversity of application domains. This has resulted in creation of new …
applications in a diversity of application domains. This has resulted in creation of new …
A survey on dynamic mobile malware detection
The outstanding advances of mobile devices stimulate their wide usage. Since mobile
devices are coupled with third-party applications, lots of security and privacy problems are …
devices are coupled with third-party applications, lots of security and privacy problems are …
Burglars' iot paradise: Understanding and mitigating security risks of general messaging protocols on iot clouds
With the increasing popularity of the Internet of Things (IoT), many IoT cloud platforms have
emerged to help the IoT manufacturers connect their devices to their users. Serving the …
emerged to help the IoT manufacturers connect their devices to their users. Serving the …
Who can find my devices? security and privacy of apple's crowd-sourced bluetooth location tracking system
Overnight, Apple has turned its hundreds-of-million-device ecosystem into the world's
largest crowd-sourced location tracking network called offline finding (OF). OF leverages …
largest crowd-sourced location tracking network called offline finding (OF). OF leverages …
A billion open interfaces for eve and mallory:{MitM},{DoS}, and tracking attacks on {iOS} and {macOS} through apple wireless direct link
Apple Wireless Direct Link (AWDL) is a key protocol in Apple's ecosystem used by over one
billion iOS and macOS devices for device-to-device communications. AWDL is a proprietary …
billion iOS and macOS devices for device-to-device communications. AWDL is a proprietary …
[PDF][PDF] Badbluetooth: Breaking android security mechanisms via malicious bluetooth peripherals.
Bluetooth is a widely used communication technology, especially under the scenarios of
mobile computing and Internet of Things. Once paired with a host device, a Bluetooth device …
mobile computing and Internet of Things. Once paired with a host device, a Bluetooth device …
Blurtooth: Exploiting cross-transport key derivation in bluetooth classic and bluetooth low energy
Bluetooth is a pervasive wireless technology specified in an open standard. The standard
defines Bluetooth Classic (BT) for high-throughput wireless services and Bluetooth Low …
defines Bluetooth Classic (BT) for high-throughput wireless services and Bluetooth Low …
Disrupting continuity of apple's wireless ecosystem security: New tracking,{DoS}, and {MitM} attacks on {iOS} and {macOS} through bluetooth low energy,{AWDL}, and …
Apple controls one of the largest mobile ecosystems, with 1.5 billion active devices
worldwide, and offers twelve proprietary wireless Continuity services. Previous works have …
worldwide, and offers twelve proprietary wireless Continuity services. Previous works have …