{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:04Z","timestamp":1750221004224,"version":"3.41.0"},"reference-count":14,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T00:00:00Z","timestamp":1563926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["GetMobile: Mobile Comp. and Comm."],"published-print":{"date-parts":[[2019,7,24]]},"abstract":"<jats:p>Apple Wireless Direct Link (AWDL) is a proprietary protocol deployed in about 1.4 billion1 end-user devices consisting of Apple's main product families such as Mac, iPhone, iPad, Apple Watch, and Apple TV? effectively all recent Apple devices containing a Wi-Fi chip. Apple does not advertise the protocol but only vaguely refers to it as a \"peer-to-peer Wi-Fi\" technology [2]. Yet, it empowers popular applications such as AirDrop and AirPlay that transparently use AWDL without the user noticing. We believe that public knowledge of this undocumented protocol would be beneficial for the following reasons.<\/jats:p>","DOI":"10.1145\/3351422.3351432","type":"journal-article","created":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T12:34:33Z","timestamp":1564058073000},"page":"30-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol"],"prefix":"10.1145","volume":"23","author":[{"given":"Milan","family":"Stute","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"David","family":"Kreitschmann","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,7,24]]},"reference":[{"unstructured":"Apple Inc. (2018). Financial information-earnings releases and 10-K annual reports. https:\/\/investor. apple.com\/investor-relations\/default.aspx  Apple Inc. (2018). Financial information-earnings releases and 10-K annual reports. https:\/\/investor. apple.com\/investor-relations\/default.aspx","key":"e_1_2_1_1_1"},{"unstructured":"Apple Inc. (2018). NSNetService class documentation. https:\/\/developer.apple.com\/ documentation\/foundation\/nsnetservice  Apple Inc. (2018). NSNetService class documentation. https:\/\/developer.apple.com\/ documentation\/foundation\/nsnetservice","key":"e_1_2_1_2_1"},{"unstructured":"Nitay Artenstein. (2017). Broadpwn: Remotely compromising Android and iOS via a bug in Broadcom's Wi-Fi chipsets. https:\/\/blog.exodusintel. com\/2017\/07\/26\/broadpwn\/  Nitay Artenstein. (2017). Broadpwn: Remotely compromising Android and iOS via a bug in Broadcom's Wi-Fi chipsets. https:\/\/blog.exodusintel. com\/2017\/07\/26\/broadpwn\/","key":"e_1_2_1_3_1"},{"unstructured":"Gal Beniamini. (2017). Over the air: Exploiting Broadcom's Wi-Fi stack. (part 2). https:\/\/ googleprojectzero.blogspot.com\/2017\/04\/overair- exploiting-broadcoms-wi-fi_11.html  Gal Beniamini. (2017). Over the air: Exploiting Broadcom's Wi-Fi stack. (part 2). https:\/\/ googleprojectzero.blogspot.com\/2017\/04\/overair- exploiting-broadcoms-wi-fi_11.html","key":"e_1_2_1_4_1"},{"unstructured":"Bluetooth Special Interest Group. (2016). Bluetooth core specification.  Bluetooth Special Interest Group. (2016). Bluetooth core specification.","key":"e_1_2_1_5_1"},{"unstructured":"GitHub. (2015). Leaked BCM4360 driver code. No longer available.  GitHub. (2015). Leaked BCM4360 driver code. No longer available.","key":"e_1_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_7_1","DOI":"10.1109\/LCN.2017.47"},{"unstructured":"Zongqing Lu Guohong Cao and La PortaThomas. (2016). \"Networking smartphones for disaster recovery.\" In IEEE PerCom '16.  Zongqing Lu Guohong Cao and La PortaThomas. (2016). \"Networking smartphones for disaster recovery.\" In IEEE PerCom '16.","key":"e_1_2_1_8_1"},{"unstructured":"IEEE Computer Society. (2016). Wireless LAN medium access control (MAC) and physical layer (PHY) specification.  IEEE Computer Society. (2016). Wireless LAN medium access control (MAC) and physical layer (PHY) specification.","key":"e_1_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_10_1","DOI":"10.1145\/3241539.3267716"},{"doi-asserted-by":"publisher","key":"e_1_2_1_11_1","DOI":"10.1145\/3241539.3241566"},{"volume-title":"USENIX Security '19 (accepted).","year":"2019","author":"Stute Milan","key":"e_1_2_1_12_1"},{"unstructured":"Wi-Fi Alliance. (2015). Neighbor Awareness Networking technical specification.  Wi-Fi Alliance. (2015). Neighbor Awareness Networking technical specification.","key":"e_1_2_1_13_1"},{"unstructured":"Wi-Fi Alliance. (2016). Wi-Fi peer-to-peer (P2P) technical specification. http:\/\/www. wi-fi.org\/file\/wi-fi-peer-to-peer-p2p-technicalspecification- v17  Wi-Fi Alliance. (2016). Wi-Fi peer-to-peer (P2P) technical specification. http:\/\/www. wi-fi.org\/file\/wi-fi-peer-to-peer-p2p-technicalspecification- v17","key":"e_1_2_1_14_1"}],"container-title":["GetMobile: Mobile Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351422.3351432","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3351422.3351432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:51Z","timestamp":1750206351000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351422.3351432"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,24]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,7,24]]}},"alternative-id":["10.1145\/3351422.3351432"],"URL":"https:\/\/doi.org\/10.1145\/3351422.3351432","relation":{},"ISSN":["2375-0529","2375-0537"],"issn-type":[{"type":"print","value":"2375-0529"},{"type":"electronic","value":"2375-0537"}],"subject":[],"published":{"date-parts":[[2019,7,24]]},"assertion":[{"value":"2019-07-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}