{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:09Z","timestamp":1750220289447,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Virginia Commonwealth Cyber Initiative (CCI)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3488932.3527279","type":"proceedings-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T04:23:26Z","timestamp":1653366206000},"page":"1210-1212","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE"],"prefix":"10.1145","author":[{"given":"Salman","family":"Ahmed","sequence":"first","affiliation":[{"name":"IBM Research, Yorktown Heights, NY, USA"}]},{"given":"Ya","family":"Xiao","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Taejoong (Tijay)","family":"Chung","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Carol","family":"Fung","sequence":"additional","affiliation":[{"name":"Virginia Commonwealth University, Richmond, VA, USA"}]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[{"name":"Google &amp; Columbia University, Mountain View, CA, USA"}]},{"given":"Danfeng (Dasphne)","family":"Yao","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"54","article-title":"Privacy Guarantees of Bluetooth Low Energy Contact Tracing","volume":"55","author":"Ahmed Salman","year":"2022","unstructured":"Salman Ahmed , Ya Xiao , Taejoong Tijay Chung , Carol Fung , Moti Yung , and Danfeng Daphne Yao . 2022 . Privacy Guarantees of Bluetooth Low Energy Contact Tracing : A Case Study on COVIDWISE. Computer , Vol. 55 , 2 (2022), 54 -- 62 . Salman Ahmed, Ya Xiao, Taejoong Tijay Chung, Carol Fung, Moti Yung, and Danfeng Daphne Yao. 2022. Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE. Computer, Vol. 55, 2 (2022), 54--62.","journal-title":"A Case Study on COVIDWISE. Computer"},{"key":"e_1_3_2_2_2_1","unstructured":"Alejandro De La Garza. 2021. COVID-19 Contact Tracing App Adoption Rates. https:\/\/time.com\/5905772\/covid-19-contact-tracing-apps\/. Accessed on April 14 2021.  Alejandro De La Garza. 2021. COVID-19 Contact Tracing App Adoption Rates. https:\/\/time.com\/5905772\/covid-19-contact-tracing-apps\/. Accessed on April 14 2021."},{"key":"e_1_3_2_2_3_1","volume-title":"et almbox","author":"Lars","year":"2020","unstructured":"Lars Baumg\"artner, Alexandra Dmitrienko , et almbox . 2020 . Mind the GAP : Security & Privacy Risks of Contact Tracing Apps . arXiv preprint arXiv:2006.05914 (2020). Lars Baumg\"artner, Alexandra Dmitrienko, et almbox. 2020. Mind the GAP: Security & Privacy Risks of Contact Tracing Apps. arXiv preprint arXiv:2006.05914 (2020)."},{"key":"e_1_3_2_2_4_1","volume-title":"et almbox","author":"Boutet Antoine","year":"2020","unstructured":"Antoine Boutet , Claude Castelluccia , et almbox . 2020 . Contact Tracing by Giant Data Collectors: Opening Pandora's Box of Threats to Privacy, Sovereignty and National Security. Ph.,D. Dissertation. EPFL, Switzerland; Inria, France; JMU W\u00fcrzburg, Germany; University of ?. Antoine Boutet, Claude Castelluccia, et almbox. 2020. Contact Tracing by Giant Data Collectors: Opening Pandora's Box of Threats to Privacy, Sovereignty and National Security. Ph.,D. Dissertation. EPFL, Switzerland; Inria, France; JMU W\u00fcrzburg, Germany; University of ?."},{"key":"e_1_3_2_2_5_1","volume-title":"Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, and Daniel J. Weitzner.","author":"Canetti Ran","year":"2020","unstructured":"Ran Canetti , Yael Tauman Kalai , Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, and Daniel J. Weitzner. 2020 . Privacy-Preserving Automated Exposure Notification. IACR Cryptol. ePrint Arch . (2020), 863. https:\/\/eprint.iacr.org\/2020\/863 Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, and Daniel J. Weitzner. 2020. Privacy-Preserving Automated Exposure Notification. IACR Cryptol. ePrint Arch. (2020), 863. https:\/\/eprint.iacr.org\/2020\/863"},{"key":"e_1_3_2_2_6_1","volume-title":"et almbox","author":"Chan Justin","year":"2020","unstructured":"Justin Chan , Shyam Gollakota , Eric Horvitz , Joseph Jaeger , Sham Kakade , Tadayoshi Kohno , John Langford , Jonathan Larson , Sudheesh Singanamalla , Jacob Sunshine , et almbox . 2020 . Pact : Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing . arXiv preprint arXiv:2004.03544 (2020). Justin Chan, Shyam Gollakota, Eric Horvitz, Joseph Jaeger, Sham Kakade, Tadayoshi Kohno, John Langford, Jonathan Larson, Sudheesh Singanamalla, Jacob Sunshine, et almbox. 2020. Pact: Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing. arXiv preprint arXiv:2004.03544 (2020)."},{"key":"e_1_3_2_2_7_1","volume-title":"Science","volume":"10","author":"Ferretti L.","year":"2020","unstructured":"L. Ferretti . 2020 . Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing . Science , 8 May 2020, Vol. 368: https:\/\/www.science.org\/doi\/ 10 .1126\/science.abb6936 (2020). L. Ferretti. 2020. Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing. Science, 8 May 2020, Vol. 368: https:\/\/www.science.org\/doi\/10.1126\/science.abb6936 (2020)."},{"key":"e_1_3_2_2_8_1","volume-title":"Exposure Notification System May Allow for Large-Scale Voter Suppression. arXiv preprint arXiv:2005.12273","author":"Rosario Gennaro Adam Krellenstein","year":"2020","unstructured":"Adam Krellenstein Rosario Gennaro , Adam Krellenstein , and James Krellenstein . 2020. Exposure Notification System May Allow for Large-Scale Voter Suppression. arXiv preprint arXiv:2005.12273 ( 2020 ). Adam Krellenstein Rosario Gennaro, Adam Krellenstein, and James Krellenstein. 2020. Exposure Notification System May Allow for Large-Scale Voter Suppression. arXiv preprint arXiv:2005.12273 (2020)."},{"key":"e_1_3_2_2_9_1","volume-title":"Exposure Notifications: Using Technology to Help Public Health Authorities Fight COVID?19. https:\/\/www.google.com\/covid19\/exposurenotifications\/. Accessed on April 14, 2021.","author":"Google and Apple Inc.","year":"2021","unstructured":"Google and Apple Inc. 2021 . Exposure Notifications: Using Technology to Help Public Health Authorities Fight COVID?19. https:\/\/www.google.com\/covid19\/exposurenotifications\/. Accessed on April 14, 2021. Google and Apple Inc. 2021. Exposure Notifications: Using Technology to Help Public Health Authorities Fight COVID?19. https:\/\/www.google.com\/covid19\/exposurenotifications\/. Accessed on April 14, 2021."},{"key":"e_1_3_2_2_10_1","unstructured":"R\u00e9my Gr\u00fcnblatt. 2021. Stop Covid Detector 3000. https:\/\/github.com\/rgrunbla\/Stop_Covid_Detector_3000. Accessed on April 14 2021.  R\u00e9my Gr\u00fcnblatt. 2021. Stop Covid Detector 3000. https:\/\/github.com\/rgrunbla\/Stop_Covid_Detector_3000. Accessed on April 14 2021."},{"key":"e_1_3_2_2_11_1","first-page":"428","article-title":"Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc","volume":"2020","author":"Gvili Yaron","year":"2020","unstructured":"Yaron Gvili . 2020 . Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc . IACR Cryptol. ePrint Arch. , Vol. 2020 (2020), 428 . Yaron Gvili. 2020. Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc. IACR Cryptol. ePrint Arch., Vol. 2020 (2020), 428.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1177\/0002764218787863"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.106204"},{"key":"e_1_3_2_2_15_1","first-page":"375","article-title":"Privacy-Preserving Contact Tracing of COVID-19 Patients","volume":"2020","author":"Reichert Leonie","year":"2020","unstructured":"Leonie Reichert , Samuel Brack , and Bj\u00f6rn Scheuermann . 2020 . Privacy-Preserving Contact Tracing of COVID-19 Patients . IACR Cryptol. ePrint Arch. , Vol. 2020 (2020), 375 . Leonie Reichert, Samuel Brack, and Bj\u00f6rn Scheuermann. 2020. Privacy-Preserving Contact Tracing of COVID-19 Patients. IACR Cryptol. ePrint Arch., Vol. 2020 (2020), 375.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_16_1","unstructured":"Otto Seiskari. 2021. Paparazzi Attack PoC. https:\/\/github.com\/oseiskar\/corona-sniffer. Accessed on April 14 2021.  Otto Seiskari. 2021. Paparazzi Attack PoC. https:\/\/github.com\/oseiskar\/corona-sniffer. Accessed on April 14 2021."},{"key":"e_1_3_2_2_17_1","volume-title":"The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with computers","author":"Shin Dong-Hee","year":"2010","unstructured":"Dong-Hee Shin . 2010a. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with computers , Vol. 22 , 5 ( 2010 ), 428--438. Dong-Hee Shin. 2010a. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with computers, Vol. 22, 5 (2010), 428--438."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2010.031446"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1215\/18752160-8698301"},{"key":"e_1_3_2_2_20_1","volume-title":"et almbox","author":"Troncoso Carmela","year":"2020","unstructured":"Carmela Troncoso , Mathias Payer , Jean-Pierre Hubaux , et almbox . 2020 . Decentralized Privacy-preserving Proximity Tracing . arXiv preprint arXiv:2005.12273 (2020). Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, et almbox. 2020. Decentralized Privacy-preserving Proximity Tracing. arXiv preprint arXiv:2005.12273 (2020)."},{"key":"e_1_3_2_2_21_1","unstructured":"Virginia Department of Health. 2021. COVIDWISE Official Contact Tracing App in Virginia. https:\/\/www.vdh.virginia.gov\/covidwise\/. Accessed on April 14 2021.  Virginia Department of Health. 2021. COVIDWISE Official Contact Tracing App in Virginia. https:\/\/www.vdh.virginia.gov\/covidwise\/. Accessed on April 14 2021."},{"key":"e_1_3_2_2_22_1","unstructured":"Martin Vuagnoux. 2020. Little Thumb Attack on SwissCovid. https:\/\/vimeo.com\/453948863. Accessed on April 14 2021.  Martin Vuagnoux. 2020. Little Thumb Attack on SwissCovid. https:\/\/vimeo.com\/453948863. Accessed on April 14 2021."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-021-03606-z"}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Nagasaki Japan","acronym":"ASIA CCS '22"},"container-title":["Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3527279","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488932.3527279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:27Z","timestamp":1750188687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3527279"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":22,"alternative-id":["10.1145\/3488932.3527279","10.1145\/3488932"],"URL":"https:\/\/doi.org\/10.1145\/3488932.3527279","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}