{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:15Z","timestamp":1750221375497,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Engineering and Physical Sciences Research Council","award":["EP\/P009301\/1"],"award-info":[{"award-number":["EP\/P009301\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176945","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"152-154","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["A Low Energy Profile"],"prefix":"10.1145","author":[{"given":"Pallavi","family":"Sivakumaran","sequence":"first","affiliation":[{"name":"Royal Holloway University of London, Egham, United Kingdom"}]},{"given":"Jorge","family":"Blasco Alis","sequence":"additional","affiliation":[{"name":"Royal Holloway University of London, Egham, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bluetooth Special Interest Group. 2016. Bluetooth Core Specification v5.0. (2016).  Bluetooth Special Interest Group. 2016. Bluetooth Core Specification v5.0. (2016)."},{"key":"e_1_3_2_1_2_1","volume-title":"Security Analysis of Wearable Fitness Devices (Fitbit)","author":"Cyr Britt","year":"2014","unstructured":"Britt Cyr , Webb Horn , Daniela Miao , and Michael Specter . 2014. Security Analysis of Wearable Fitness Devices (Fitbit) . Massachusetts Institute of Technology ( 2014 ). Britt Cyr, Webb Horn, Daniela Miao, and Michael Specter. 2014. Security Analysis of Wearable Fitness Devices (Fitbit). Massachusetts Institute of Technology (2014)."},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","author":"Kilbride Thomas","year":"2017","unstructured":"Thomas Kilbride , James Thomas , and Stefan Boesen . 2017 . Ninebot by Segway miniPRO Vulnerabilities. (2017) . Retrieved September 21, 2017 from https:\/\/www.ioactive.com\/pdfs\/IOActive-Security-Advisory-Ninebot-Segway-miniPRO_Final.pdf Thomas Kilbride, James Thomas, and Stefan Boesen. 2017. Ninebot by Segway miniPRO Vulnerabilities. (2017). Retrieved September 21, 2017 from https:\/\/www.ioactive.com\/pdfs\/IOActive-Security-Advisory-Ninebot-Segway-miniPRO_Final.pdf"},{"key":"e_1_3_2_1_4_1","unstructured":"David Malone and Kevin Mahern. 2011. Investigating the Distribution of Password Choices. (2011). Retrieved from https:\/\/arxiv.org\/pdf\/1104.3722.pdf  David Malone and Kevin Mahern. 2011. Investigating the Distribution of Password Choices. (2011). Retrieved from https:\/\/arxiv.org\/pdf\/1104.3722.pdf"},{"key":"e_1_3_2_1_5_1","volume-title":"Bluetooth: With Low Energy Comes Low Security. In WOOT '13: 7th USENIX Workshop on Offensive Technologies, Washington, D.C., USA","author":"Ryan Mike","year":"2013","unstructured":"Mike Ryan . 2013 . Bluetooth: With Low Energy Comes Low Security. In WOOT '13: 7th USENIX Workshop on Offensive Technologies, Washington, D.C., USA , August 13, 2013. Mike Ryan. 2013. Bluetooth: With Low Energy Comes Low Security. In WOOT '13: 7th USENIX Workshop on Offensive Technologies, Washington, D.C., USA, August 13, 2013."}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Tempe AZ USA","acronym":"CODASPY '18"},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176945","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176945"}},"subtitle":["Analysing Characteristic Security on BLE Peripherals"],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":5,"alternative-id":["10.1145\/3176258.3176945","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176945","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}