{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:59:47Z","timestamp":1764842387511,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T00:00:00Z","timestamp":1592179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Science Foundation of Jiangsu","award":["BK20180421"],"award-info":[{"award-number":["BK20180421"]}]},{"name":"National Cryptography Development Fund","award":["MMJJ20180105"],"award-info":[{"award-number":["MMJJ20180105"]}]},{"name":"National Natural Science Fund for Excellent Young Scholars","award":["61722210"],"award-info":[{"award-number":["61722210"]}]},{"name":"Fundamental Research Funds for the Central Universities","award":["NE2018106"],"award-info":[{"award-number":["NE2018106"]}]},{"name":"National Natural Science Foundation of China","award":["61932013, 61532012, 61802180"],"award-info":[{"award-number":["61932013, 61532012, 61802180"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,15]]},"DOI":"10.1145\/3386901.3389025","type":"proceedings-article","created":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T01:27:30Z","timestamp":1591493250000},"page":"286-298","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["BlueDoor"],"prefix":"10.1145","author":[{"given":"Jiliang","family":"Wang","sequence":"first","affiliation":[{"name":"Tsinghua University"}]},{"given":"Feng","family":"Hu","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Ye","family":"Zhou","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Yunhao","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University and Michigan State University"}]},{"given":"Hanyi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics"}]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics"}]}],"member":"320","published-online":{"date-parts":[[2020,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE-IWS.2013.6616827"},{"issue":"1","key":"e_1_3_2_1_2_1","article-title":"Bluetooth low energy: a survey","volume":"162","author":"Al Hosni Shamsaa Hilal","year":"2017","unstructured":"Shamsaa Hilal Al Hosni . Bluetooth low energy: a survey . International Journal of Computer Applications , 162 ( 1 ), 2017 . Shamsaa Hilal Al Hosni. Bluetooth low energy: a survey. International Journal of Computer Applications, 162(1), 2017.","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_1_3_1","volume-title":"by application (transportation, consumer electronics, home automation, medical), by region, and segment forecasts","author":"Bluetooth","year":"2018","unstructured":"Bluetooth smart & smart ready market analysis by technology , by application (transportation, consumer electronics, home automation, medical), by region, and segment forecasts , 2018 - 2025. https:\/\/www.grandviewresearch.com\/industry-analysis\/bluetooth-smart-and-smart-ready-market. Bluetooth smart & smart ready market analysis by technology, by application (transportation, consumer electronics, home automation, medical), by region, and segment forecasts, 2018 - 2025. https:\/\/www.grandviewresearch.com\/industry-analysis\/bluetooth-smart-and-smart-ready-market."},{"key":"e_1_3_2_1_4_1","unstructured":"Global wearables market grows 7.7 the leader position says idc. https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS43598218.  Global wearables market grows 7.7 the leader position says idc. https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS43598218."},{"key":"e_1_3_2_1_5_1","unstructured":"New wearables forecast from idc shows smartwatches continuing their ascendance while wristbands face flat growth. https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS44000018.  New wearables forecast from idc shows smartwatches continuing their ascendance while wristbands face flat growth. https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS44000018."},{"key":"e_1_3_2_1_6_1","volume-title":"Black Hat USA","author":"Jasek S\u0142awomir","year":"2016","unstructured":"S\u0142awomir Jasek . Gattacking bluetooth smart devices . Black Hat USA , 2016 . S\u0142awomir Jasek. Gattacking bluetooth smart devices. Black Hat USA, 2016."},{"key":"e_1_3_2_1_7_1","unstructured":"Bluetooth specification (core_v4.2.pdf). https:\/\/www.bluetooth.org\/DocMan\/handlers\/DownloadDoc.ashx?doc_id=286439.  Bluetooth specification (core_v4.2.pdf). https:\/\/www.bluetooth.org\/DocMan\/handlers\/DownloadDoc.ashx?doc_id=286439."},{"key":"e_1_3_2_1_8_1","unstructured":"Robert Davidson Akiba Carles Cufi and Kevin Townsend. Getting started with bluetooth low energy chapter04. https:\/\/www.oreilly.com\/library\/view\/getting-started-with\/9781491900550\/ch04.html.  Robert Davidson Akiba Carles Cufi and Kevin Townsend. Getting started with bluetooth low energy chapter04. https:\/\/www.oreilly.com\/library\/view\/getting-started-with\/9781491900550\/ch04.html."},{"key":"e_1_3_2_1_9_1","unstructured":"nrf connect github. https:\/\/github.com\/NordicSemiconductor\/Android-nRF-Connect.  nrf connect github. https:\/\/github.com\/NordicSemiconductor\/Android-nRF-Connect."},{"key":"e_1_3_2_1_10_1","unstructured":"Official site of bluez. http:\/\/www.bluez.org\/.  Official site of bluez. http:\/\/www.bluez.org\/."},{"key":"e_1_3_2_1_11_1","unstructured":"nrf51 dongle. http:\/\/infocenter.nordicsemi.com\/pdf\/nRF51_Dongle_UG_vL0.pdf.  nrf51 dongle. http:\/\/infocenter.nordicsemi.com\/pdf\/nRF51_Dongle_UG_vL0.pdf."},{"key":"e_1_3_2_1_12_1","unstructured":"Bluetooth jamming: What for and how to? https:\/\/www.jammer-store.com\/bluetooth-jamming-what-for-and-how-to.html.  Bluetooth jamming: What for and how to? https:\/\/www.jammer-store.com\/bluetooth-jamming-what-for-and-how-to.html."},{"key":"e_1_3_2_1_13_1","unstructured":"Change bluetooth address. https:\/\/kasiviswanathanblog.wordpress.com\/2017\/03\/28\/change-bluetooth-address\/.  Change bluetooth address. https:\/\/kasiviswanathanblog.wordpress.com\/2017\/03\/28\/change-bluetooth-address\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Wireshark user documentation. https:\/\/www.wireshark.org\/docs\/.  Wireshark user documentation. https:\/\/www.wireshark.org\/docs\/."},{"key":"e_1_3_2_1_15_1","unstructured":"The 2019 state of the auth report: Has 2fa hit mainstream yet? https:\/\/duo.com\/blog\/the-2019-state-of-the-auth-report-has-2fa-hit-mainstream-yet.  The 2019 state of the auth report: Has 2fa hit mainstream yet? https:\/\/duo.com\/blog\/the-2019-state-of-the-auth-report-has-2fa-hit-mainstream-yet."},{"key":"e_1_3_2_1_16_1","unstructured":"State of the auth. https:\/\/duo.com\/assets\/ebooks\/state-of-the-auth-2019.pdf.  State of the auth. https:\/\/duo.com\/assets\/ebooks\/state-of-the-auth-2019.pdf."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3268932"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381716.2381729"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23482"},{"key":"e_1_3_2_1_20_1","volume-title":"Xiaomi tops apple and fitbit with 21.5share in q3","author":"Idc","year":"2018","unstructured":"Idc report : Xiaomi tops apple and fitbit with 21.5share in q3 2018 . https:\/\/www.wearable-technologies.com\/2018\/12\/idc-report-xiaomi-tops\\-apple-and-fitbit-with-21-5\/global-wearable-market-share-in-q3-2018\/. Idc report: Xiaomi tops apple and fitbit with 21.5share in q3 2018. https:\/\/www.wearable-technologies.com\/2018\/12\/idc-report-xiaomi-tops\\-apple-and-fitbit-with-21-5\/global-wearable-market-share-in-q3-2018\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Key factors that determine the range of bluetooth. https:\/\/www.bluetooth.com\/blog\/3-key-factors-that-determinethe-range-of-bluetooth\/.  Key factors that determine the range of bluetooth. https:\/\/www.bluetooth.com\/blog\/3-key-factors-that-determinethe-range-of-bluetooth\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317687"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906403"},{"key":"e_1_3_2_1_24_1","first-page":"4","article-title":"Bluetooth: With low energy comes low security","volume":"13","author":"Mike Ryan","year":"2013","unstructured":"Mike Ryan et al . Bluetooth: With low energy comes low security . WOOT , 13 : 4 -- 4 , 2013 . Mike Ryan et al. Bluetooth: With low energy comes low security. WOOT, 13:4--4, 2013.","journal-title":"WOOT"},{"key":"e_1_3_2_1_25_1","unstructured":"Ryan. Crackle - cracking bluetooth smart encryption. http:\/\/lacklustre.net\/projects\/crackle\/.  Ryan. Crackle - cracking bluetooth smart encryption. http:\/\/lacklustre.net\/projects\/crackle\/."},{"key":"e_1_3_2_1_26_1","volume-title":"Security vulnerabilities of bluetooth low energy technology (ble)","author":"O'Sullivan Harry","year":"2015","unstructured":"Harry O'Sullivan . Security vulnerabilities of bluetooth low energy technology (ble) . Tufts University , 2015 . Harry O'Sullivan. Security vulnerabilities of bluetooth low energy technology (ble). Tufts University, 2015."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.3390\/jsan7030028"},{"key":"e_1_3_2_1_28_1","unstructured":"Ashwath Anand Pammi. Threats Countermeasures and Research Trends for BLE-Based IoT Devices. PhD thesis Arizona State University 2017.  Ashwath Anand Pammi. Threats Countermeasures and Research Trends for BLE-Based IoT Devices. PhD thesis Arizona State University 2017."},{"key":"e_1_3_2_1_30_1","volume-title":"International Telemetering Conference Proceedings","author":"Zegeye Wondimu K","year":"2015","unstructured":"Wondimu K Zegeye . Exploiting bluetooth low energy pairing vulnerability in telemedicine . In International Telemetering Conference Proceedings , 2015 . Wondimu K Zegeye. Exploiting bluetooth low energy pairing vulnerability in telemedicine. In International Telemetering Conference Proceedings, 2015."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.63"},{"key":"e_1_3_2_1_32_1","first-page":"1047","volume-title":"Proceedings of USENIX Security Symposium","author":"Kasper","year":"2019","unstructured":"Kasper B. Rasmussen Daniele Antonioli, Nils Ole Tippenhauer. The knob is broken: Exploiting low entropy in the encryption key negotiation of bluetooth br\/edr . In Proceedings of USENIX Security Symposium , pages 1047 -- 1061 , 2019 . Kasper B. Rasmussen Daniele Antonioli, Nils Ole Tippenhauer. The knob is broken: Exploiting low entropy in the encryption key negotiation of bluetooth br\/edr. In Proceedings of USENIX Security Symposium, pages 1047--1061, 2019."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCCSP.2008.4537388"},{"key":"e_1_3_2_1_34_1","first-page":"1","volume-title":"The 3rd IEEE\/IFIP International Conference in Central Asia on Internet","author":"Hypponen Konstantin","year":"2007","unstructured":"Konstantin Hypponen and Keijo MJ Haataja . \"nino\" man-in-the-middle attack on bluetooth secure simple pairing . In The 3rd IEEE\/IFIP International Conference in Central Asia on Internet , pages 1 -- 5 . IEEE, 2007 . Konstantin Hypponen and Keijo MJ Haataja. \"nino\" man-in-the-middle attack on bluetooth secure simple pairing. In The 3rd IEEE\/IFIP International Conference in Central Asia on Internet, pages 1--5. IEEE, 2007."},{"key":"e_1_3_2_1_35_1","unstructured":"Great Scott Gadgets. Ubertooth one. https:\/\/greatscottgadgets.com\/ubertoothone\/.  Great Scott Gadgets. Ubertooth one. https:\/\/greatscottgadgets.com\/ubertoothone\/."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873594"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906407"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699343.2699350"}],"event":{"name":"MobiSys '20: The 18th Annual International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Toronto Ontario Canada","acronym":"MobiSys '20"},"container-title":["Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386901.3389025","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3386901.3389025","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:26Z","timestamp":1750199606000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386901.3389025"}},"subtitle":["breaking the secure information flow via BLE vulnerability"],"short-title":[],"issued":{"date-parts":[[2020,6,15]]},"references-count":37,"alternative-id":["10.1145\/3386901.3389025","10.1145\/3386901"],"URL":"https:\/\/doi.org\/10.1145\/3386901.3389025","relation":{},"subject":[],"published":{"date-parts":[[2020,6,15]]},"assertion":[{"value":"2020-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}