{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T05:38:50Z","timestamp":1772429930225,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319663319","type":"print"},{"value":"9783319663326","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66332-6_3","type":"book-chapter","created":{"date-parts":[[2017,10,11]],"date-time":"2017-10-11T11:58:05Z","timestamp":1507723085000},"page":"48-69","source":"Crossref","is-referenced-by-count":24,"title":["Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit"],"prefix":"10.1007","author":[{"given":"Hossein","family":"Fereidooni","sequence":"first","affiliation":[]},{"given":"Jiska","family":"Classen","sequence":"additional","affiliation":[]},{"given":"Tom","family":"Spink","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Patras","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Miettinen","sequence":"additional","affiliation":[]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,12]]},"reference":[{"key":"3_CR1","unstructured":"Forbes. Wearable tech market to be worth $34 billion by 2020, February 2016. https:\/\/www.forbes.com\/sites\/paullamkin\/2016\/02\/17\/wearable-tech-market-to-be-worth-34-billion-by-2020"},{"key":"3_CR2","unstructured":"International Data Corporation. Worldwide quarterly wearable device tracker, March 2017. https:\/\/www.idc.com\/tracker\/showproductinfo.jsp?prod_id=962"},{"key":"3_CR3","unstructured":"Mashable. Husband learns wife is pregnant from her Fitbit data, February 2016. http:\/\/mashable.com\/2016\/02\/10\/fitbit-pregnant\/"},{"key":"3_CR4","unstructured":"The Wall Street Journal. Prosecutors say Fitbit device exposed fibbing in rape case, April 2016. http:\/\/blogs.wsj.com\/law\/2016\/04\/21\/prosecutors-say-fitbit-device-exposed-fibbing-in-rape-case\/"},{"key":"3_CR5","unstructured":"The Guardian. Court sets legal precedent with evidence from Fitbit health tracker, November 2014. https:\/\/www.theguardian.com\/technology\/2014\/nov\/18\/court-accepts-data-fitbit-health-tracker"},{"key":"3_CR6","unstructured":"VitalityHealth. https:\/\/www.vitality.co.uk\/rewards\/partners\/activity-tracking\/"},{"key":"3_CR7","unstructured":"AchieveMint. https:\/\/www.achievemint.com"},{"key":"3_CR8","unstructured":"StepBet. https:\/\/www.stepbet.com\/"},{"key":"3_CR9","unstructured":"Rahman, M., Carbunar, B., Banik, M.: Fit and vulnerable: attacks and defenses for a health monitoring device. In: Proceedings of the Privacy Enhancing Technologies Symposium (PETS), Bloomington, IN, USA (2013)"},{"key":"3_CR10","unstructured":"Cyr, B., Horn, W., Miao, D., Specter, M.: Security Analysis of Wearable Fitness Devices (Fitbit) (2014). https:\/\/courses.csail.mit.edu\/6.857\/2014\/files\/17-cyrbritt-webbhorn-specter-dmiao-hacking-fitbit.pdf"},{"key":"3_CR11","unstructured":"Clausing, E., Schiefer, M., Morgenstern, M.: AV TEST Analysis of Fitbit Vulnerabilities (2016). https:\/\/www.av-test.org\/fileadmin\/pdf\/avtest_2016-04_fitbit_vulnerabilities.pdf"},{"key":"3_CR12","unstructured":"Schellevis, M., Jacobs, B., Meijer, C.: Security\/privacy of wearable fitness tracking IoT devices. Radboud niversity. Bachelor thesis: Getting access to your own Fitbit data, August 2016"},{"key":"3_CR13","unstructured":"Accenture. Digital trust in the IoT era (2015)"},{"key":"3_CR14","unstructured":"PwC 2016: Use of wearables in the workplace is halted by lack of trust. http:\/\/www.pwc.co.uk\/who-we-are\/regional-sites\/northern-ireland\/press-releases\/use-of-wearables-in-the-workplace-is-halted-by-lack-of-trust-pwc-research.html"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Fereidooni, H., Frassetto, T., Miettinen, M., Sadeghi, A.-R., Conti, M.: Fitness Trackers: Fit for health but unfit for security and privacy. In: Proceedings of the IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health (CHASE workshop: SEARCH 2017), in press, Philadelphia, Pennsylvania, USA, July 17\u201319 (2017)","DOI":"10.1109\/CHASE.2017.54"},{"key":"3_CR16","unstructured":"Galileo project. https:\/\/bitbucket.org\/benallard\/galileo\/"},{"key":"3_CR17","unstructured":"Wireshark network protocol analyzer. https:\/\/www.wireshark.org\/"},{"key":"3_CR18","unstructured":"Hilts, A., Parsons, C., Knockel, J.: Every Step You Fake: A Comparative Analysis of Fitness Tracker Privacy and Security. Open Effect Report (2016). https:\/\/openeffect.ca\/reports\/Every_Step_You_Fake.pdf"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Clausing, E., Schiefer, M., Morgenstern, M.: Internet of Things: Security Evaluation of nine Fitness Trackers. AV TEST, The Independent IT-Security institute, Magdeburg, Germany (2015)","DOI":"10.1016\/S1353-4858(15)30020-9"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Zhou, W., Piramuthu, S.: Security\/privacy of wearable fitness tracking IoT devices. In: IEEE Iberian Conference on Information Systems and Technologies (2014)","DOI":"10.1109\/CISTI.2014.6877073"},{"issue":"2","key":"3_CR21","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1109\/TMC.2015.2418774","volume":"15","author":"M Rahman","year":"2016","unstructured":"Rahman, M., Carbunar, B., Topkara, U.: Secure management of low power fitness trackers. Published IEEE Trans. Mob. Comput. 15(2), 447\u2013459 (2016)","journal-title":"Published IEEE Trans. Mob. Comput."}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66332-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T13:17:46Z","timestamp":1570195066000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66332-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319663319","9783319663326"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66332-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}