{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T18:26:51Z","timestamp":1776277611854,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1718084,1750809,1834215,1834216"],"award-info":[{"award-number":["1718084,1750809,1834215,1834216"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354240","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"1469-1483","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps"],"prefix":"10.1145","author":[{"given":"Chaoshun","family":"Zuo","sequence":"first","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]},{"given":"Haohuang","family":"Wen","sequence":"additional","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]},{"given":"Zhiqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]},{"given":"Yinqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Alrawi Omar","year":"2019"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24723-4_2"},{"key":"e_1_3_2_2_4_1","unstructured":"BlueBorne. 2019. The Attack Vector \"BlueBorne\" Exposes Almost Every Connected Device. https:\/\/armis.com\/blueborne\/.  BlueBorne. 2019. The Attack Vector \"BlueBorne\" Exposes Almost Every Connected Device. https:\/\/armis.com\/blueborne\/."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/HONET.2008.4810232"},{"key":"e_1_3_2_2_6_1","volume-title":"Menghan Sun, Ronghai Yang, and Kehuan Zhang.","author":"Chen Jiongyi","year":"2018"},{"key":"e_1_3_2_2_7_1","unstructured":"Brian Cusack Bryce Antony Gerard Ward and Shaunak Mody. 2017. Assessment of security vulnerabilities in wearable devices. (2017).  Brian Cusack Bryce Antony Gerard Ward and Shaunak Mody. 2017. Assessment of security vulnerabilities in wearable devices. (2017)."},{"key":"e_1_3_2_2_8_1","volume-title":"Security analysis of wearable fitness devices (fitbit)","author":"Cyr Britt","year":"2014"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873594"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/BIBE.2012.6399701"},{"key":"e_1_3_2_2_11_1","volume-title":"Protecting Privacy of BLE Device Users. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Fawaz Kassem","year":"2016"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_3_2_2_13_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Fernandes Earlence","year":"2016"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"e_1_3_2_2_15_1","volume-title":"Black Hat USA Conference.","author":"Jasek S\u0142awomir","year":"2016"},{"key":"e_1_3_2_2_16_1","first-page":"269","article-title":"Smart home automation security","volume":"5","author":"Jose Arun Cyril","year":"2015","journal-title":"SmartCR"},{"key":"e_1_3_2_2_17_1","volume-title":"International static analysis symposium","author":"Komondoor Raghavan"},{"key":"e_1_3_2_2_18_1","volume-title":"An Active Man-in-the-middle Attack On Bluetooth Smart Devices. Safety and Security Studies","author":"TAL MELAMED.","year":"2018"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00039"},{"key":"e_1_3_2_2_20_1","volume-title":"Management and Applications (SERA), 2017 IEEE 15th International Conference on. IEEE, 379--385","author":"Oliff William","year":"2017"},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of the 7th USENIX Conference on Offensive Technologies (WOOT'13)","author":"Ryan Mike","year":"2013"},{"key":"e_1_3_2_2_22_1","unstructured":"Pallavi Sivakumaran and Jorge Blasco. 2018. A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape.  Pallavi Sivakumaran and Jorge Blasco. 2018. A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176945"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1081-6"},{"key":"e_1_3_2_2_25_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Tian Yuan","year":"2017"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180169"},{"key":"e_1_3_2_2_27_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Wang Xueqiang","year":"2019"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/800078.802557"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3168390.3168430"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICInfA.2012.6246921"},{"key":"e_1_3_2_2_32_1","volume-title":"International Telemetering Conference Proceedings. International Foundation for Telemetering.","author":"Zegeye Wondimu K","year":"2015"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFST.2017.8210548"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00009"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23146"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134089"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354240","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354240","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:03Z","timestamp":1750202643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354240"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":36,"alternative-id":["10.1145\/3319535.3354240","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354240","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}