{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:05:54Z","timestamp":1767337554587,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,6,20]],"date-time":"2016-06-20T00:00:00Z","timestamp":1466380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CNS1423221"],"award-info":[{"award-number":["CNS1423221"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,6,20]]},"DOI":"10.1145\/2906388.2906403","type":"proceedings-article","created":{"date-parts":[[2016,6,23]],"date-time":"2016-06-23T13:08:12Z","timestamp":1466687292000},"page":"333-345","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Practical Bluetooth Traffic Sniffing"],"prefix":"10.1145","author":[{"given":"Wahhab","family":"Albazrqaoe","sequence":"first","affiliation":[{"name":"Michigan State University &amp; University of Karbala, East Lansing, MI, USA"}]},{"given":"Jun","family":"Huang","sequence":"additional","affiliation":[{"name":"Michigan State University, East Lansing, MI, USA"}]},{"given":"Guoliang","family":"Xing","sequence":"additional","affiliation":[{"name":"Michigan State University, East Lansing, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android auto. https:\/\/www.android.com\/auto\/.  Android auto. https:\/\/www.android.com\/auto\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Bluetooth technology website. https:\/\/www.bluetooth.com\/.  Bluetooth technology website. https:\/\/www.bluetooth.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Busting the bluetooth myth -- getting raw access. http:\/\/www.remote-exploit.org\/content\/busting_bluetooth_myth.pdf.  Busting the bluetooth myth -- getting raw access. http:\/\/www.remote-exploit.org\/content\/busting_bluetooth_myth.pdf."},{"key":"e_1_3_2_1_4_1","unstructured":"Carplay -- apple. http:\/\/www.apple.com\/ios\/carplay\/.  Carplay -- apple. http:\/\/www.apple.com\/ios\/carplay\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Gnuradio. https:\/\/gnuradio.org\/.  Gnuradio. https:\/\/gnuradio.org\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Ubertooth. http:\/\/ubertooth.sourceforge.net\/.  Ubertooth. http:\/\/ubertooth.sourceforge.net\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Adafruit. Bluefruit le sniffer. https:\/\/www.adafruit.com\/products\/2269.  Adafruit. Bluefruit le sniffer. https:\/\/www.adafruit.com\/products\/2269."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342400"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873594"},{"key":"e_1_3_2_1_10_1","volume-title":"Improved key recovery of level 1 of the bluetooth encryption system","author":"Fluhrer S. R.","year":"2002","unstructured":"S. R. Fluhrer and C. S. Inc . Improved key recovery of level 1 of the bluetooth encryption system . Cambridge University Press , 2002 . S. R. Fluhrer and C. S. Inc. Improved key recovery of level 1 of the bluetooth encryption system. Cambridge University Press, 2002."},{"key":"e_1_3_2_1_11_1","unstructured":"FTE. Frontline test equipments. http:\/\/www.fte.com\/.  FTE. Frontline test equipments. http:\/\/www.fte.com\/."},{"key":"e_1_3_2_1_12_1","unstructured":"FTE. Fte comprobe bpa 600. http:\/\/www.fte.com\/products\/BPA600.aspx.  FTE. Fte comprobe bpa 600. http:\/\/www.fte.com\/products\/BPA600.aspx."},{"key":"e_1_3_2_1_13_1","unstructured":"FTE. Fte comprobe sodera. http:\/\/www.fte.com\/products\/sodera.aspx.  FTE. Fte comprobe sodera. http:\/\/www.fte.com\/products\/sodera.aspx."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018456"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282424"},{"key":"e_1_3_2_1_16_1","volume-title":"C. kuen Shieh, W. shyang Hwang, and A. Ziviani. An evaluation framework for more realistic simulations of mpeg video transmission. Journal of INFORMATION SCIENCE AND ENGINEERING 24, 425--440","author":"C.","year":"2008","unstructured":"C. heng Ke , C. kuen Shieh, W. shyang Hwang, and A. Ziviani. An evaluation framework for more realistic simulations of mpeg video transmission. Journal of INFORMATION SCIENCE AND ENGINEERING 24, 425--440 ( 2008 ), 2008. C. heng Ke, C. kuen Shieh, W. shyang Hwang, and A. Ziviani. An evaluation framework for more realistic simulations of mpeg video transmission. Journal of INFORMATION SCIENCE AND ENGINEERING 24, 425--440 (2008), 2008."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/646281.687823"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848235"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2010.5762779"},{"key":"e_1_3_2_1_20_1","unstructured":"T. Instruments. Sniffer firmware of cc2540. https:\/\/e2e.ti.com\/support\/wireless_connectivity\/f\/538\/t\/197748.  T. Instruments. Sniffer firmware of cc2540. https:\/\/e2e.ti.com\/support\/wireless_connectivity\/f\/538\/t\/197748."},{"key":"e_1_3_2_1_21_1","first-page":"169","volume-title":"B","author":"Joachims T.","year":"1999","unstructured":"T. Joachims . Making large-scale SVM learning practical. In B . Sch\u00f6lkopf, C. Burges, and A. Smola, editors, Advances in Kernel Methods - Support Vector Learning, chapter 11, pages 169 -- 184 . MIT Press , Cambridge, MA, 1999 . T. Joachims. Making large-scale SVM learning practical. In B. Sch\u00f6lkopf, C. Burges, and A. Smola, editors, Advances in Kernel Methods - Support Vector Learning, chapter 11, pages 169--184. MIT Press, Cambridge, MA, 1999."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869983.1870014"},{"key":"e_1_3_2_1_23_1","unstructured":"Logitech. Logitec advanced 2.4 ghz technology. http:\/\/www.logitech.com\/images\/pdf\/roem\/Logitech_Adv_24_Ghz_Whitepaper_BPG2009.pdf.  Logitech. Logitec advanced 2.4 ghz technology. http:\/\/www.logitech.com\/images\/pdf\/roem\/Logitech_Adv_24_Ghz_Whitepaper_BPG2009.pdf."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_7"},{"key":"e_1_3_2_1_25_1","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptanalysis of bluetooth keystream generator two-level e0. In in Advances in Cryptology-ASIACRYPT","author":"Lu Y.","year":"2004","unstructured":"Y. Lu and S. Vaudenay . Cryptanalysis of bluetooth keystream generator two-level e0. In in Advances in Cryptology-ASIACRYPT 2004 , Lecture Notes in Computer Science . Springer , 2004. Y. Lu and S. Vaudenay. Cryptanalysis of bluetooth keystream generator two-level e0. In in Advances in Cryptology-ASIACRYPT 2004, Lecture Notes in Computer Science. Springer, 2004."},{"key":"e_1_3_2_1_26_1","series-title":"Lecture Notes in Computer Science","volume-title":"Advances on Cryptography - CRYPTO","author":"Lu Y.","year":"2004","unstructured":"Y. Lu and S. Vaudenay . Faster correlation attack on bluetooth keystream generator e0 . In Advances on Cryptography - CRYPTO 2004 , Lecture Notes in Computer Science , 2004. Y. Lu and S. Vaudenay. Faster correlation attack on bluetooth keystream generator e0. In Advances on Cryptography - CRYPTO 2004, Lecture Notes in Computer Science, 2004."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/BMSB.2014.6873572"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382309"},{"key":"e_1_3_2_1_29_1","unstructured":"E. Researches. Ettus research. https:\/\/www.ettus.com.  E. Researches. Ettus research. https:\/\/www.ettus.com."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 7th USENIX Conference on Offensive Technologies, WOOT'13","author":"Ryan M.","year":"2013","unstructured":"M. Ryan . Bluetooth : With low energy comes low security . In Proceedings of the 7th USENIX Conference on Offensive Technologies, WOOT'13 . USENIX Association , 2013 . M. Ryan. Bluetooth: With low energy comes low security. In Proceedings of the 7th USENIX Conference on Offensive Technologies, WOOT'13. USENIX Association, 2013."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067170.1067176"},{"key":"e_1_3_2_1_32_1","unstructured":"B. SIG. Bluetooth core specification v4.0. https:\/\/www.bluetooth.org\/.  B. SIG. Bluetooth core specification v4.0. https:\/\/www.bluetooth.org\/."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the First USENIX Workshop on Offensive Technologies, WOOT'07","author":"Spill D.","year":"2007","unstructured":"D. Spill and A. Bittau . Bluesniff: Eve meets alice and bluetooth . In Proceedings of the First USENIX Workshop on Offensive Technologies, WOOT'07 . USENIX Association , 2007 . D. Spill and A. Bittau. Bluesniff: Eve meets alice and bluetooth. In Proceedings of the First USENIX Workshop on Offensive Technologies, WOOT'07. USENIX Association, 2007."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500426"}],"event":{"name":"MobiSys'16: The 14th Annual International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Singapore Singapore","acronym":"MobiSys'16"},"container-title":["Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2906388.2906403","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2906388.2906403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:25Z","timestamp":1750222465000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2906388.2906403"}},"subtitle":["Systems and Privacy Implications"],"short-title":[],"issued":{"date-parts":[[2016,6,20]]},"references-count":34,"alternative-id":["10.1145\/2906388.2906403","10.1145\/2906388"],"URL":"https:\/\/doi.org\/10.1145\/2906388.2906403","relation":{},"subject":[],"published":{"date-parts":[[2016,6,20]]},"assertion":[{"value":"2016-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}