{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T13:46:17Z","timestamp":1758980777369,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"LOEWE initiative (Hesse, Germany)"},{"name":"Hessen State Ministry for Higher Education, Research and the Arts"},{"name":"German Federal Ministry of Education and Research"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1145\/3448300.3468251","type":"proceedings-article","created":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T14:57:40Z","timestamp":1624546660000},"page":"374-376","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["OpenHaystack"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Heinrich","sequence":"first","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Milan","family":"Stute","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Cloud Authentication Tokens Inside Out. ElcomSoft blog","author":"Afonin Oleg","year":"2017","unstructured":"Oleg Afonin . Cloud Authentication Tokens Inside Out. ElcomSoft blog . Nov. 30, 2017 . url: https:\/\/blog.elcomsoft.com\/2017\/11\/icloud-authentication-tokens-inside-out\/ (visited on 04\/19\/2021). Oleg Afonin. Cloud Authentication Tokens Inside Out. ElcomSoft blog. Nov. 30, 2017. url: https:\/\/blog.elcomsoft.com\/2017\/11\/icloud-authentication-tokens-inside-out\/ (visited on 04\/19\/2021)."},{"key":"e_1_3_2_1_2_1","unstructured":"Apple Inc. Entitlements - Apple Developer Documentation. url: https:\/\/developer.apple.com\/documentation\/bundleresources\/entitlements (visited on 04\/19\/2021).  Apple Inc. Entitlements - Apple Developer Documentation. url: https:\/\/developer.apple.com\/documentation\/bundleresources\/entitlements (visited on 04\/19\/2021)."},{"key":"e_1_3_2_1_3_1","volume-title":"Find My Network Accessory Specification. Version Release R1. No longer publicly available","author":"Apple Inc.","year":"2020","unstructured":"Apple Inc. Find My Network Accessory Specification. Version Release R1. No longer publicly available . 2020 . url: https:\/\/developer.apple.com\/find-my\/. Apple Inc. Find My Network Accessory Specification. Version Release R1. No longer publicly available. 2020. url: https:\/\/developer.apple.com\/find-my\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Apple Inc. MFi Program. url: https:\/\/mfi.apple.com\/ (visited on 04\/19\/2021).  Apple Inc. MFi Program. url: https:\/\/mfi.apple.com\/ (visited on 04\/19\/2021)."},{"key":"e_1_3_2_1_5_1","unstructured":"Apple Inc. Notarizing macOS Software Before Distribution - Apple Developer Documentation. url: https:\/\/developer.apple.com\/documentation\/xcode\/notarizing_macos_software_before_distribution (visited on 04\/19\/2021).  Apple Inc. Notarizing macOS Software Before Distribution - Apple Developer Documentation. url: https:\/\/developer.apple.com\/documentation\/xcode\/notarizing_macos_software_before_distribution (visited on 04\/19\/2021)."},{"key":"e_1_3_2_1_6_1","unstructured":"Apple Inc. NSDistributedNotificationCenter - Apple Developer Documentation. url: https:\/\/developer.apple.com\/documentation\/foundation\/nsdistributednotificationcenter (visited on 04\/19\/2021).  Apple Inc. NSDistributedNotificationCenter - Apple Developer Documentation. url: https:\/\/developer.apple.com\/documentation\/foundation\/nsdistributednotificationcenter (visited on 04\/19\/2021)."},{"key":"e_1_3_2_1_7_1","volume-title":"USENIX Security Symposium.","author":"Heinrich Alexander","year":"2021","unstructured":"Alexander Heinrich , Matthias Hollick , Thomas Schneider , Milan Stute , and Christian Weinert . \"PrivateDrop : Practical Privacy-Preserving Authentication for Apple AirDrop \". In: USENIX Security Symposium. 2021 . url: https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/heinrich. Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, and Christian Weinert. \"PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop\". In: USENIX Security Symposium. 2021. url: https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/heinrich."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Alexander Heinrich and Milan Stute. OpenHaystack Implementation. 2021. url: https:\/\/github.com\/seemoo-lab\/openhaystack.  Alexander Heinrich and Milan Stute. OpenHaystack Implementation. 2021. url: https:\/\/github.com\/seemoo-lab\/openhaystack.","DOI":"10.1145\/3448300.3468251"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0045"},{"key":"e_1_3_2_1_10_1","unstructured":"Nordic Semiconductor. nRF52840 DK - User Guide v1.0.0. url: https:\/\/infocenter.nordicsemi.com\/pdf\/nRF52840_DK_User_Guide_20201203.pdf (visited on 04\/19\/2021).  Nordic Semiconductor. nRF52840 DK - User Guide v1.0.0. url: https:\/\/infocenter.nordicsemi.com\/pdf\/nRF52840_DK_User_Guide_20201203.pdf (visited on 04\/19\/2021)."},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX Security Symposium.","author":"Stute Milan","year":"2021","unstructured":"Milan Stute , Alexander Heinrich , Jannik Lorenz , and Matthias Hollick . \" Disrupting Continuity of Apple's Wireless Ecosystem Security : New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi \". In: USENIX Security Symposium. 2021 . url: https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/stute. Milan Stute, Alexander Heinrich, Jannik Lorenz, and Matthias Hollick. \"Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi\". In: USENIX Security Symposium. 2021. url: https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/stute."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241566"},{"key":"e_1_3_2_1_13_1","volume-title":"The Open Wireless Link Project","author":"Stute Milan","year":"2018","unstructured":"Milan Stute , David Kreitschmann , and Matthias Hollick . The Open Wireless Link Project . 2018 . url: https:\/\/owlink.org. Milan Stute, David Kreitschmann, and Matthias Hollick. The Open Wireless Link Project. 2018. url: https:\/\/owlink.org."},{"key":"e_1_3_2_1_14_1","volume-title":"USENIX Security Symposium.","author":"Stute Milan","year":"2019","unstructured":"Milan Stute , Sashank Narain , Alex Mariotto , Alexander Heinrich , David Kreitschmann , Guevara Noubir , and Matthias Hollick . \" A Billion Open Interfaces for Eve and Mallory : MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link \". In: USENIX Security Symposium. 2019 . url: https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/stute. Milan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, and Matthias Hollick. \"A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link\". In: USENIX Security Symposium. 2019. url: https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/stute."}],"event":{"name":"WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Abu Dhabi United Arab Emirates","acronym":"WiSec '21"},"container-title":["Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448300.3468251","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448300.3468251","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:42Z","timestamp":1750193262000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448300.3468251"}},"subtitle":["a framework for tracking personal bluetooth devices via Apple's massive find my network"],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":14,"alternative-id":["10.1145\/3448300.3468251","10.1145\/3448300"],"URL":"https:\/\/doi.org\/10.1145\/3448300.3468251","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]},"assertion":[{"value":"2021-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}