{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:14Z","timestamp":1750219994374,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["456292433"],"award-info":[{"award-number":["456292433"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"German Federal Ministry of Education and Research","award":["01IS18037A 01IS18025A"],"award-info":[{"award-number":["01IS18037A 01IS18025A"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3511496","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"264-275","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantifying the Risk of Wormhole Attacks on Bluetooth Contact Tracing"],"prefix":"10.1145","author":[{"given":"Stefan","family":"Czybik","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Braunschweig, Braunschweig, Germany"}]},{"given":"Daniel","family":"Arp","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Konrad","family":"Rieck","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Braunschweig, Braunschweig, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010226"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00069"},{"volume-title":"Epidemiological Motivation of the Transmission Risk Level. https:\/\/raw.githubusercontent.com\/corona-warn-app\/cwa-documentation\/5f45237279d4b92c71e98d747958ff0f550ebce9\/transmission_risk.pdf, 10","year":"2020","key":"e_1_3_2_2_3_1","unstructured":"Team. Epidemiological Motivation of the Transmission Risk Level. https:\/\/raw.githubusercontent.com\/corona-warn-app\/cwa-documentation\/5f45237279d4b92c71e98d747958ff0f550ebce9\/transmission_risk.pdf, 10 2020 . (visited September, 2021). Team. Epidemiological Motivation of the Transmission Risk Level. https:\/\/raw.githubusercontent.com\/corona-warn-app\/cwa-documentation\/5f45237279d4b92c71e98d747958ff0f550ebce9\/transmission_risk.pdf, 10 2020. (visited September, 2021)."},{"key":"e_1_3_2_2_4_1","volume-title":"https:\/\/github.com\/DP-3T\/documents\/blob\/master\/Security%20analysis\/Privacy%20and%20Security%20Attacks%20on%20Digital%20Proximity%20Tracing%20Systems.pdf","author":"Privacy","year":"2020","unstructured":"Privacy and security attacks on digital proximity tracing systems. https:\/\/github.com\/DP-3T\/documents\/blob\/master\/Security%20analysis\/Privacy%20and%20Security%20Attacks%20on%20Digital%20Proximity%20Tracing%20Systems.pdf , 2020 . (visited September, 2021). Privacy and security attacks on digital proximity tracing systems. https:\/\/github.com\/DP-3T\/documents\/blob\/master\/Security%20analysis\/Privacy%20and%20Security%20Attacks%20on%20Digital%20Proximity%20Tracing%20Systems.pdf, 2020. (visited September, 2021)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/WD52248.2021.9508280"},{"key":"e_1_3_2_2_6_1","volume-title":"Apr. 2020 a. (visited","author":"nd Apple Inc.(2020 a )]spec-gapGoogle Inc. and Apple Inc.","year":"2021","unstructured":"nd Apple Inc.(2020 a )]spec-gapGoogle Inc. and Apple Inc. COVID-19 Exposure Notifications. https:\/\/www.google.com\/covid19\/exposurenotifications , Apr. 2020 a. (visited September , 2021 ). nd Apple Inc.(2020 a )]spec-gapGoogle Inc. and Apple Inc. COVID-19 Exposure Notifications. https:\/\/www.google.com\/covid19\/exposurenotifications, Apr. 2020 a. (visited September, 2021)."},{"key":"e_1_3_2_2_7_1","volume-title":"Apr. 2020 b. (visited","author":"nd Apple Inc.(2020 b )]spec-gap-btGoogle Inc. and Apple Inc. COVID-19-Notification, Bluetooth Specification, Version 1.2.","year":"2021","unstructured":"nd Apple Inc.(2020 b )]spec-gap-btGoogle Inc. and Apple Inc. COVID-19-Notification, Bluetooth Specification, Version 1.2. https:\/\/blog.google\/documents\/70\/Exposure_Notification_-_Bluetooth_Specification_v1.2.2.pdf , Apr. 2020 b. (visited September , 2021 ). nd Apple Inc.(2020 b )]spec-gap-btGoogle Inc. and Apple Inc. COVID-19-Notification, Bluetooth Specification, Version 1.2. https:\/\/blog.google\/documents\/70\/Exposure_Notification_-_Bluetooth_Specification_v1.2.2.pdf, Apr. 2020 b. (visited September, 2021)."},{"key":"e_1_3_2_2_8_1","volume-title":"Version 1.2. https:\/\/blog.google\/documents\/69\/Exposure_Notification_-_Cryptography_Specification_v1.2.1.pdf","author":"nd Apple Inc.(2020 c )]spec-gap-cryptoGoogle Inc. and Apple Inc. COVID-19-Notification","year":"2020","unstructured":"nd Apple Inc.(2020 c )]spec-gap-cryptoGoogle Inc. and Apple Inc. COVID-19-Notification , Cryptography Specification , Version 1.2. https:\/\/blog.google\/documents\/69\/Exposure_Notification_-_Cryptography_Specification_v1.2.1.pdf , Apr. 2020 c. (visited September, 2021). nd Apple Inc.(2020 c )]spec-gap-cryptoGoogle Inc. and Apple Inc. COVID-19-Notification, Cryptography Specification, Version 1.2. https:\/\/blog.google\/documents\/69\/Exposure_Notification_-_Cryptography_Specification_v1.2.1.pdf, Apr. 2020 c. (visited September, 2021)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"e_1_3_2_2_11_1","volume-title":"Corona-warn-app version 1.9 greift auf version 2 des exposure notification framework zur\u00fcck","author":"Koch-Institut R.","year":"2020","unstructured":"R. Koch-Institut . Corona-warn-app version 1.9 greift auf version 2 des exposure notification framework zur\u00fcck , 2020 . URL https:\/\/www.coronawarn.app\/de\/blog\/2020--12--16-corona-warn-app-version-1--9\/. (visited September, 2021). R. Koch-Institut. Corona-warn-app version 1.9 greift auf version 2 des exposure notification framework zur\u00fcck, 2020. URL https:\/\/www.coronawarn.app\/de\/blog\/2020--12--16-corona-warn-app-version-1--9\/. (visited September, 2021)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0250826"},{"key":"e_1_3_2_2_13_1","volume-title":"Covid-19 contact-tracing apps: a survey on the global deployment and challenges. Technical report","author":"Li J.","year":"2020","unstructured":"J. Li and X. Guo . Covid-19 contact-tracing apps: a survey on the global deployment and challenges. Technical report , Imperial College London , 2020 . J. Li and X. Guo. Covid-19 contact-tracing apps: a survey on the global deployment and challenges. Technical report, Imperial College London, 2020."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPIN51156.2021.9662591"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2021.104787"},{"key":"e_1_3_2_2_16_1","volume-title":"Privacy notice corona-warn-app. https:\/\/www.coronawarn.app\/assets\/documents\/cwa-privacy-notice-1.3-en.pdf","author":"Koch-Institut Robert","year":"2020","unstructured":"020)]rki-cwa-privacy Robert Koch-Institut . Privacy notice corona-warn-app. https:\/\/www.coronawarn.app\/assets\/documents\/cwa-privacy-notice-1.3-en.pdf , 2020 . (visited September, 2021). 020)]rki-cwa-privacyRobert Koch-Institut. Privacy notice corona-warn-app. https:\/\/www.coronawarn.app\/assets\/documents\/cwa-privacy-notice-1.3-en.pdf, 2020. (visited September, 2021)."},{"key":"e_1_3_2_2_17_1","volume-title":"Infektionsketten digital unterbrechen mit der corona-warn-app. https:\/\/www.rki.de\/DE\/Content\/InfAZ\/N\/Neuartiges_Coronavirus\/WarnApp\/Warn_App.html, 9","author":"Koch-Institut Robert","year":"2021","unstructured":"021)]cwa-high-risk Robert Koch-Institut . Infektionsketten digital unterbrechen mit der corona-warn-app. https:\/\/www.rki.de\/DE\/Content\/InfAZ\/N\/Neuartiges_Coronavirus\/WarnApp\/Warn_App.html, 9 2021 . (visited September, 2021). 021)]cwa-high-riskRobert Koch-Institut. Infektionsketten digital unterbrechen mit der corona-warn-app. https:\/\/www.rki.de\/DE\/Content\/InfAZ\/N\/Neuartiges_Coronavirus\/WarnApp\/Warn_App.html, 9 2021. (visited September, 2021)."},{"key":"e_1_3_2_2_18_1","volume-title":"Bluetooth core specification. https:\/\/www.bluetooth.com\/specifications\/specs\/core-specification-5--2\/","author":"B.","year":"2019","unstructured":"B. SIG. Bluetooth core specification. https:\/\/www.bluetooth.com\/specifications\/specs\/core-specification-5--2\/ , 2019 . (visited September, 2021). B. SIG. Bluetooth core specification. https:\/\/www.bluetooth.com\/specifications\/specs\/core-specification-5--2\/, 2019. (visited September, 2021)."},{"key":"e_1_3_2_2_19_1","volume-title":"In proceedings of the 43rd International Conference on Software Engineering (ICSE 2021)","author":"Sun R.","year":"2020","unstructured":"R. Sun , W. Wang , M. Xue , G. Tyson , S. Camtepe , and D. C. Ranasinghe . An empirical assessment of global covid-19 contact tracing applications . In In proceedings of the 43rd International Conference on Software Engineering (ICSE 2021) , 2020 . R. Sun, W. Wang, M. Xue, G. Tyson, S. Camtepe, and D. C. Ranasinghe. An empirical assessment of global covid-19 contact tracing applications. In In proceedings of the 43rd International Conference on Software Engineering (ICSE 2021), 2020."},{"key":"e_1_3_2_2_22_1","first-page":"422","volume-title":"Analysis of detecting wormhole attack in wireless networks","author":"Win K. S.","year":"2008","unstructured":"K. S. Win . Analysis of detecting wormhole attack in wireless networks . In World Academy of Science , Engineering and Technology, pages 422 -- 428 , 2008 . K. S. Win. Analysis of detecting wormhole attack in wireless networks. In World Academy of Science, Engineering and Technology, pages 422--428, 2008."}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Baltimore MD USA","acronym":"CODASPY '22"},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511496","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:37Z","timestamp":1750182577000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511496"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":19,"alternative-id":["10.1145\/3508398.3511496","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3511496","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}