{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T21:04:40Z","timestamp":1761253480378,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T00:00:00Z","timestamp":1594166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry of Education and Research"},{"name":"Hessen State Ministry for Higher Education, Research and the Arts"},{"name":"Deutsche Forschungsgemeinschaft (DFG)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,8]]},"DOI":"10.1145\/3395351.3399343","type":"proceedings-article","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T04:29:10Z","timestamp":1595392150000},"page":"111-121","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["MagicPairing"],"prefix":"10.1145","author":[{"given":"Dennis","family":"Heinze","sequence":"first","affiliation":[{"name":"TU Darmstadt, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiska","family":"Classen","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Felix","family":"Rohrbach","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,7,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00093"},{"volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Antonioli Daniele","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"Apple. 2020. Bug Reporting---Profiles and Logs. https:\/\/developer.apple.com\/bug-reporting\/profiles-and-logs\/.  Apple. 2020. Bug Reporting---Profiles and Logs. https:\/\/developer.apple.com\/bug-reporting\/profiles-and-logs\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Apple. 2020. Developer Documentation - IOKit. https:\/\/developer.apple.com\/documentation\/iokit.  Apple. 2020. Developer Documentation - IOKit. https:\/\/developer.apple.com\/documentation\/iokit."},{"key":"e_1_3_2_1_5_1","unstructured":"Apple. 2020. MFi Program. https:\/\/developer.apple.com\/programs\/mfi\/.  Apple. 2020. MFi Program. https:\/\/developer.apple.com\/programs\/mfi\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Eli Biham and Lior Neumann. 2018. Breaking the Bluetooth Pairing: Fixed Coordinate Invalid Curve Attack. http:\/\/www.cs.technion.ac.il\/~biham\/BT\/bt-fixed-coordinate-invalid-curve-attack.pdf.  Eli Biham and Lior Neumann. 2018. Breaking the Bluetooth Pairing: Fixed Coordinate Invalid Curve Attack. http:\/\/www.cs.technion.ac.il\/~biham\/BT\/bt-fixed-coordinate-invalid-curve-attack.pdf."},{"key":"e_1_3_2_1_7_1","unstructured":"Bluetooth SIG. 2020. Bluetooth Core Specification 5.2. https:\/\/www.bluetooth.com\/specifications\/bluetooth-core-specification.  Bluetooth SIG. 2020. Bluetooth Core Specification 5.2. https:\/\/www.bluetooth.com\/specifications\/bluetooth-core-specification."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029200"},{"key":"e_1_3_2_1_9_1","unstructured":"Jiska Classen. 2019. All Wireless Communication Stacks are Equally Broken.  Jiska Classen. 2019. All Wireless Communication Stacks are Equally Broken."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Jiska Classen Daniel Wegemer Paul Patras Tom Spink and Matthias Hollick. 2018. Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fit-bit Cloud App and Firmware. In PACM on Interactive Mobile Wearable and Ubiquitous Technologies (IMWUT).  Jiska Classen Daniel Wegemer Paul Patras Tom Spink and Matthias Hollick. 2018. Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fit-bit Cloud App and Firmware. In PACM on Interactive Mobile Wearable and Ubiquitous Technologies (IMWUT).","DOI":"10.1145\/3191737"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Dan Harkins. 2008. Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES). RFC 5297. RFC Editor. https:\/\/tools.ietf.org\/html\/rfc5297  Dan Harkins. 2008. Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES). RFC 5297. RFC Editor. https:\/\/tools.ietf.org\/html\/rfc5297","DOI":"10.17487\/rfc5297"},{"key":"e_1_3_2_1_12_1","unstructured":"Alexander Heinrich. 2019. Analyzing Apple's Private Wireless Communication Protocols with a Focus on Security and Privacy.  Alexander Heinrich. 2019. Analyzing Apple's Private Wireless Communication Protocols with a Focus on Security and Privacy."},{"key":"e_1_3_2_1_13_1","unstructured":"Dennis Heinze. 2020. ToothPicker: Enabling Over-the-Air and In-Process Fuzzing Within Apple's Bluetooth Ecosystem.  Dennis Heinze. 2020. ToothPicker: Enabling Over-the-Air and In-Process Fuzzing Within Apple's Bluetooth Ecosystem."},{"key":"e_1_3_2_1_14_1","unstructured":"Aki Helin. 2020. radamsa - a general-purpose fuzzer. https:\/\/gitlab.com\/akihe\/radamsa.  Aki Helin. 2020. radamsa - a general-purpose fuzzer. https:\/\/gitlab.com\/akihe\/radamsa."},{"volume-title":"3rd IEEE\/IFIP International Conference in Central Asia on Internet. IEEE.","year":"2007","author":"Hypponen Konstantin","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"Kim Jong Cracks. 2020. checkra1n---iPhone 5s - iPhone X iOS 12.3 and up. https:\/\/checkra.in\/.  Kim Jong Cracks. 2020. checkra1n---iPhone 5s - iPhone X iOS 12.3 and up. https:\/\/checkra.in\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Jonathan Levin. 2019. New OSX Book Volume II *iOS Internals::Kernel Mode. 20--22 pages. http:\/\/newosxbook.com  Jonathan Levin. 2019. New OSX Book Volume II * iOS Internals::Kernel Mode. 20--22 pages. http:\/\/newosxbook.com"},{"key":"e_1_3_2_1_18_1","unstructured":"Dennis Mantz. 2019. Frida-based general purpose fuzzer. https:\/\/github.com\/demantz\/frizzer.  Dennis Mantz. 2019. Frida-based general purpose fuzzer. https:\/\/github.com\/demantz\/frizzer."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326089"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0057"},{"key":"e_1_3_2_1_21_1","unstructured":"Trevor Perrin and Moxie Marlinspike. 2016. The Double Ratchet Algorithm. https:\/\/signal.org\/docs\/specifications\/doubleratchet\/doubleratchet.pdf  Trevor Perrin and Moxie Marlinspike. 2016. The Double Ratchet Algorithm. https:\/\/signal.org\/docs\/specifications\/doubleratchet\/doubleratchet.pdf"},{"key":"e_1_3_2_1_22_1","unstructured":"Ole Andr\u00e9 V. Ravn\u00e5s. 2020. Frida - A world-class dynamic instrumentation framework. https:\/\/frida.re\/.  Ole Andr\u00e9 V. Ravn\u00e5s. 2020. Frida - A world-class dynamic instrumentation framework. https:\/\/frida.re\/."},{"key":"e_1_3_2_1_23_1","unstructured":"Don Reisinger. 2019. Apple's AirPods Business Is Bigger Than You Think. https:\/\/fortune.com\/2019\/08\/06\/apple-airpods-business\/.  Don Reisinger. 2019. Apple's AirPods Business Is Bigger Than You Think. https:\/\/fortune.com\/2019\/08\/06\/apple-airpods-business\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_23"},{"volume-title":"Bluetooth: With Low Energy Comes Low Security. In Presented as part of the 7th USENIX Workshop on Offensive Technologies. https:\/\/www.usenix.org\/system\/files\/conference\/woot13\/woot13-ryan.pdf","year":"2013","author":"Ryan Mike","key":"e_1_3_2_1_25_1"},{"volume-title":"Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services. ACM.","year":"2005","author":"Wool Yaniv","key":"e_1_3_2_1_26_1"},{"volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Stute Milan","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","unstructured":"Davide Toldo. 2019. Analyzing the macOS Bluetooth Stack.  Davide Toldo. 2019. Analyzing the macOS Bluetooth Stack."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Maximilian von Tschirschnitz Ludwig Peuckert Fabian Franzen and Jens Grossklags. 2020. Method Confusion Attack on Bluetooth Pairing. In Under submission.  Maximilian von Tschirschnitz Ludwig Peuckert Fabian Franzen and Jens Grossklags. 2020. Method Confusion Attack on Bluetooth Pairing. In Under submission.","DOI":"10.1109\/SP40001.2021.00013"}],"event":{"name":"WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Linz Austria","acronym":"WiSec '20"},"container-title":["Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395351.3399343","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395351.3399343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:34Z","timestamp":1750199914000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395351.3399343"}},"subtitle":["Apple's take on securing bluetooth peripherals"],"short-title":[],"issued":{"date-parts":[[2020,7,8]]},"references-count":29,"alternative-id":["10.1145\/3395351.3399343","10.1145\/3395351"],"URL":"https:\/\/doi.org\/10.1145\/3395351.3399343","relation":{},"subject":[],"published":{"date-parts":[[2020,7,8]]},"assertion":[{"value":"2020-07-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}