{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T05:50:27Z","timestamp":1775109027554,"version":"3.50.1"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100010002","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/spw54247.2022.9833881","type":"proceedings-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:14:47Z","timestamp":1658780087000},"page":"301-311","source":"Crossref","is-referenced-by-count":6,"title":["AirTag of the Clones: Shenanigans with Liberated Item Finders"],"prefix":"10.1109","author":[{"given":"Thomas","family":"Roth","sequence":"first","affiliation":[{"name":"Leveldown Security"}]},{"given":"Fabian","family":"Freyer","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[{"name":"TU Darmstadt,SEEMOO"}]},{"given":"Jiska","family":"Classen","sequence":"additional","affiliation":[{"name":"TU Darmstadt,SEEMOO"}]}],"member":"263","reference":[{"key":"ref39","article-title":"BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy","author":"wu","year":"2020","journal-title":"14th USENIX Workshop on Offensive Technologies (WOOT 20)"},{"key":"ref38","first-page":"37","article-title":"Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks","author":"zhang","year":"2020","journal-title":"29th USENIX Security Symposium (USENIX Security 20)"},{"key":"ref33","article-title":"OTA Updates\/AirTag","year":"2022"},{"key":"ref32","volume":"i","author":"levin","year":"2020","journal-title":"*OS Internals"},{"key":"ref31","article-title":"Frida - A world-class dynamic instrumentation framework","author":"ravn\u00e5s","year":"2022"},{"key":"ref30","article-title":"Bug Reporting&#x2014;Profiles and Logs","year":"2022"},{"key":"ref37","article-title":"Breaking the Bluetooth Pairing: Fixed Coordinate Invalid Curve Attack","author":"biham","year":"2018"},{"key":"ref36","first-page":"911","article-title":"SweynTooth: Unleashing Mayhem over Bluetooth Low Energy","author":"garbelini","year":"2020","journal-title":"2020 USENIX Annual Technical Conference (USENIX ATC)"},{"key":"ref35","article-title":"Zero-Day: Hijacking iCloud Credentials with Apple Airtags (Stored XSS)","author":"rauch","year":"2021"},{"key":"ref34","article-title":"tsschecker","year":"2022"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3468251"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467822"},{"key":"ref11","article-title":"nRF52832 Product Specification v1.1","author":"semiconductor","year":"2016"},{"key":"ref12","article-title":"Apple AirTag Teardown & Test Point Mapping","author":"o\u2019flynn","year":"2021"},{"key":"ref13","article-title":"An update on AirTag and unwanted tracking","year":"2022"},{"key":"ref14","article-title":"Apple Enhancing AirTags Anti-Stalking Measures With Android App and Shorter Sound Intervals","author":"clover","year":"2021"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467821"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528546"},{"key":"ref17","first-page":"181","article-title":"Who Tracks the Trackers? Circumventing Apple&#x2019;s Anti-Tracking Alerts in the Find My Network","author":"mayberry","year":"0"},{"key":"ref18","article-title":"How to reset your AirTag","year":"2021"},{"key":"ref19","article-title":"What to do if you get an alert that an AirTag or Find My network accessory is with you","year":"2022"},{"key":"ref28","article-title":"Bluetooth Core Specification 5.2","author":"sig","year":"2020"},{"key":"ref4","article-title":"Over the Air-Tag: shenanigans with the most over-engineered keyfinder","author":"classen","year":"2021","journal-title":"Presentation at hardwear io Netherlands 2021"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2012.2195782"},{"key":"ref3","article-title":"Wibbly Wobbly, Timey Wimey &#x2013; What&#x2019;s Really Inside Apple&#x2019;s U1 Chip","author":"classen","year":"2021","journal-title":"Presentation at Black Hat USA 2021"},{"key":"ref6","article-title":"Apple Platform Security","year":"2021"},{"key":"ref29","article-title":"BtleJack: a new Bluetooth Low Energy swiss-army knife","author":"cauquil","year":"2021"},{"key":"ref5","article-title":"Hacking the Apple AirTags","author":"roth","year":"2021","journal-title":"Presentation at DEF CON 29"},{"key":"ref8","article-title":"Multiple Bluetooth Low Energy (BLE) Tracker Vulnerabilities","author":"heiland","year":"2016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399422"},{"key":"ref2","article-title":"Apple introduces AirTag","year":"2021"},{"key":"ref9","article-title":"Apple&#x2019;s Find My network now offers new third-party finding experiences","year":"2021"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"227","DOI":"10.2478\/popets-2021-0045","article-title":"Who Can Find My Devices? Security and Privacy of Apple&#x2019;s Crowd-Sourced Bluetooth Location Tracking System","volume":"3","author":"heinrich","year":"2021","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"ref46","article-title":"Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging","author":"leu","year":"2021"},{"key":"ref20","article-title":"&#x2019;Silent AirTags&#x2019; With Speakers Removed Pop Up on Etsy, eBay","author":"kan","year":"2022"},{"key":"ref45","article-title":"Pixel 6 Pro Technical Specifications","year":"2022"},{"key":"ref22","author":"van woudberg","year":"2022","journal-title":"The Hardware Hacking Handbook &#x2013; Breaking Embedded Security with Hardware Attacks"},{"key":"ref21","article-title":"Send My: Arbitrary data transmission via Apple&#x2019;s Find My network","author":"br\u00e4unlein","year":"2021"},{"key":"ref42","article-title":"FiRa Consortium Website","year":"2022"},{"key":"ref24","article-title":"nRF52 Debug Resurrection (APPROTECT Bypass) Part 1","year":"2020"},{"key":"ref41","article-title":"NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit","author":"klee","year":"0"},{"key":"ref23","article-title":"Chip.Fail - Glitching the Silicon of the Connected World","author":"roth","year":"2019","journal-title":"Presentation at Black Hat USA 2019"},{"key":"ref44","article-title":"NXP Secure UWB deployed in Samsung Galaxy Note20 Ultra Bringing the First UWB-Enabled Android Device to Market","author":"semiconductors","year":"2020"},{"key":"ref26","article-title":"Open On-Chip Debugger","year":"2022"},{"key":"ref43","article-title":"Digital Key Release","year":"2022"},{"key":"ref25","article-title":"nRF52 Debug Resurrection (APPROTECT Bypass) Part 2","year":"2020"}],"event":{"name":"2022 IEEE Security and Privacy Workshops (SPW)","location":"San Francisco, CA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Security and Privacy Workshops (SPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833855\/9833856\/09833881.pdf?arnumber=9833881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T20:02:43Z","timestamp":1660593763000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833881\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/spw54247.2022.9833881","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}