{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:14:41Z","timestamp":1769746481439,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/P009301\/1"],"award-info":[{"award-number":["EP\/P009301\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3595806","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"1004-1015","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7102-6318","authenticated-orcid":false,"given":"Pallavi","family":"Sivakumaran","sequence":"first","affiliation":[{"name":"Royal Holloway, University of London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3581-1500","authenticated-orcid":false,"given":"Chaoshun","family":"Zuo","sequence":"additional","affiliation":[{"name":"Ohio State University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6527-5994","authenticated-orcid":false,"given":"Zhiqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"Ohio State University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4392-9023","authenticated-orcid":false,"given":"Jorge","family":"Blasco","sequence":"additional","affiliation":[{"name":"Universidad Polit\u00e9cnica de Madrid, Spain"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"BLE External Memory Bootloader and Bootloadable. [Online]. Available: http:\/\/www.cypress.com\/file\/228556\/download. [Accessed","year":"2022","unstructured":"2015. BLE External Memory Bootloader and Bootloadable. [Online]. Available: http:\/\/www.cypress.com\/file\/228556\/download. [Accessed : 21 May 2022 ]. 2015. BLE External Memory Bootloader and Bootloadable. [Online]. Available: http:\/\/www.cypress.com\/file\/228556\/download. [Accessed: 21 May 2022]."},{"key":"e_1_3_2_1_2_1","volume-title":"Available: https:\/\/www.ti.com\/tool\/download\/SIMPLELINK-CC2640R2-SDK\/1.40.00.45. [Accessed","author":"Profile OAD","year":"2022","unstructured":"2016. OAD Profile . [Online]. Available: https:\/\/www.ti.com\/tool\/download\/SIMPLELINK-CC2640R2-SDK\/1.40.00.45. [Accessed : 01 May 2022 ]. 2016. OAD Profile. [Online]. Available: https:\/\/www.ti.com\/tool\/download\/SIMPLELINK-CC2640R2-SDK\/1.40.00.45. [Accessed: 01 May 2022]."},{"key":"e_1_3_2_1_3_1","volume-title":"Buttonless Secure DFU Service. [Online]. Available: https:\/\/infocenter.nordicsemi.com\/index.jsp?topic=%2Fcom.nordic.infocenter.sdk5.v14.0.0%2Fservice_dfu.html. [Accessed","year":"2022","unstructured":"2017. Buttonless Secure DFU Service. [Online]. Available: https:\/\/infocenter.nordicsemi.com\/index.jsp?topic=%2Fcom.nordic.infocenter.sdk5.v14.0.0%2Fservice_dfu.html. [Accessed : 20 May 2022 ]. 2017. Buttonless Secure DFU Service. [Online]. Available: https:\/\/infocenter.nordicsemi.com\/index.jsp?topic=%2Fcom.nordic.infocenter.sdk5.v14.0.0%2Fservice_dfu.html. [Accessed: 20 May 2022]."},{"key":"e_1_3_2_1_4_1","volume-title":"Consider blocklisting Qualcomm CSR firmware update service. [Online]. Available: https:\/\/github.com\/WebBluetoothCG\/registries\/issues\/20. [Accessed","year":"2022","unstructured":"2017. Consider blocklisting Qualcomm CSR firmware update service. [Online]. Available: https:\/\/github.com\/WebBluetoothCG\/registries\/issues\/20. [Accessed : 25 May 2022 ]. 2017. Consider blocklisting Qualcomm CSR firmware update service. [Online]. Available: https:\/\/github.com\/WebBluetoothCG\/registries\/issues\/20. [Accessed: 25 May 2022]."},{"key":"e_1_3_2_1_5_1","volume-title":"Device Firmware Update Service. [Online]. Available: https:\/\/infocenter.nordicsemi.com\/index.jsp?topic=%2Fcom.nordic.infocenter.sdk5.v11.0.0%2Fgroup__ble__sdk__srv__dfu.html. [Accessed","year":"2022","unstructured":"2017. Device Firmware Update Service. [Online]. Available: https:\/\/infocenter.nordicsemi.com\/index.jsp?topic=%2Fcom.nordic.infocenter.sdk5.v11.0.0%2Fgroup__ble__sdk__srv__dfu.html. [Accessed : 25 May 2022 ]. 2017. Device Firmware Update Service. [Online]. Available: https:\/\/infocenter.nordicsemi.com\/index.jsp?topic=%2Fcom.nordic.infocenter.sdk5.v11.0.0%2Fgroup__ble__sdk__srv__dfu.html. [Accessed: 25 May 2022]."},{"key":"e_1_3_2_1_6_1","unstructured":"2018. Androguard. https:\/\/github.com\/androguard\/androguard.  2018. Androguard. https:\/\/github.com\/androguard\/androguard."},{"key":"e_1_3_2_1_7_1","volume-title":"Bluetooth low energy overview. [Online]. Available: https:\/\/developer.android.com\/guide\/topics\/connectivity\/bluetooth-le. [Accessed","year":"2022","unstructured":"2020. Bluetooth low energy overview. [Online]. Available: https:\/\/developer.android.com\/guide\/topics\/connectivity\/bluetooth-le. [Accessed : 01 Feb 2022 ]. 2020. Bluetooth low energy overview. [Online]. Available: https:\/\/developer.android.com\/guide\/topics\/connectivity\/bluetooth-le. [Accessed: 01 Feb 2022]."},{"key":"e_1_3_2_1_8_1","volume-title":"PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Andow Benjamin","year":"2019","unstructured":"Benjamin Andow , Samin\u00a0Yaseer Mahmud , Wenyu Wang , Justin Whitaker , William Enck , Bradley Reaves , Kapil Singh , and Tao Xie . 2019 . PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA, 585\u2013602. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/andow Benjamin Andow, Samin\u00a0Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Tao Xie. 2019. PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 585\u2013602. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/andow"},{"key":"e_1_3_2_1_9_1","volume-title":"29th {USENIX} Security Symposium ({USENIX} Security","author":"Andow Benjamin","year":"2020","unstructured":"Benjamin Andow , Samin\u00a0Yaseer Mahmud , Justin Whitaker , William Enck , Bradley Reaves , Kapil Singh , and Serge Egelman . 2020. Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with POLICHECK . In 29th {USENIX} Security Symposium ({USENIX} Security 2020 ). Benjamin Andow, Samin\u00a0Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Serge Egelman. 2020. Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with POLICHECK. In 29th {USENIX} Security Symposium ({USENIX} Security 2020)."},{"key":"e_1_3_2_1_10_1","volume-title":"Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Antonakakis Manos","year":"2017","unstructured":"Manos Antonakakis , Tim April , Michael Bailey , Matt Bernhard , Elie Bursztein , Jaime Cochran , Zakir Durumeric , J.\u00a0 Alex Halderman , Luca Invernizzi , Michalis Kallitsis , Deepak Kumar , Chaz Lever , Zane Ma , Joshua Mason , Damian Menscher , Chad Seaman , Nick Sullivan , Kurt Thomas , and Yi Zhou . 2017 . Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17) . USENIX Association, Vancouver, BC, 1093\u20131110. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/antonakakis Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J.\u00a0Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 1093\u20131110. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/antonakakis"},{"key":"e_1_3_2_1_11_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Antonioli Daniele","year":"2019","unstructured":"Daniele Antonioli , Nils\u00a0Ole Tippenhauer , and Kasper\u00a0 B Rasmussen . 2019 . The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR\/EDR . In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, 1047\u20131061. Daniele Antonioli, Nils\u00a0Ole Tippenhauer, and Kasper\u00a0B Rasmussen. 2019. The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR\/EDR. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, 1047\u20131061."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45715-1_11"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0036"},{"key":"e_1_3_2_1_15_1","volume-title":"Bluetooth Market Update","author":"Bluetooth Special Interest Group","year":"2018","unstructured":"Bluetooth Special Interest Group . 2018. Bluetooth Market Update 2018 . Bluetooth Special Interest Group. 2018. Bluetooth Market Update 2018."},{"key":"e_1_3_2_1_16_1","volume-title":"16 Bit UUIDs for Members. [Online]. Available: https:\/\/www.bluetooth.com\/specifications\/assigned-numbers\/16-bit-uuids-for-members\/ [Accessed","author":"Bluetooth Special Interest Group","year":"2020","unstructured":"Bluetooth Special Interest Group . 2020. 16 Bit UUIDs for Members. [Online]. Available: https:\/\/www.bluetooth.com\/specifications\/assigned-numbers\/16-bit-uuids-for-members\/ [Accessed 28 May 2020 ]. Bluetooth Special Interest Group. 2020. 16 Bit UUIDs for Members. [Online]. Available: https:\/\/www.bluetooth.com\/specifications\/assigned-numbers\/16-bit-uuids-for-members\/ [Accessed 28 May 2020]."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338507.3358617"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Timothy Claeys Franck Rousseau Boris Simunovic and Bernard Tourancheau. 2019. Thermal covert channel in Bluetooth Low Energy networks. In WiSec. 267\u2013276.  Timothy Claeys Franck Rousseau Boris Simunovic and Bernard Tourancheau. 2019. Thermal covert channel in Bluetooth Low Energy networks. In WiSec. 267\u2013276.","DOI":"10.1145\/3317549.3319730"},{"key":"e_1_3_2_1_19_1","volume-title":"Protecting Privacy of BLE Device Users. In USENIX Security Symposium. 1205\u20131221","author":"Fawaz Kassem","year":"2016","unstructured":"Kassem Fawaz , Kyu-Han Kim , and Kang\u00a0 G Shin . 2016 . Protecting Privacy of BLE Device Users. In USENIX Security Symposium. 1205\u20131221 . Kassem Fawaz, Kyu-Han Kim, and Kang\u00a0G Shin. 2016. Protecting Privacy of BLE Device Users. In USENIX Security Symposium. 1205\u20131221."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.31"},{"key":"e_1_3_2_1_22_1","volume-title":"Bluetooth Low Energy: The Developer\u2019s Handbook. Upper Saddle River","author":"Heydon Robin","unstructured":"Robin Heydon . 2013. Bluetooth Low Energy: The Developer\u2019s Handbook. Upper Saddle River , N.J. : Prentice Hall . Robin Heydon. 2013. Bluetooth Low Energy: The Developer\u2019s Handbook. Upper Saddle River, N.J. : Prentice Hall."},{"key":"e_1_3_2_1_23_1","volume-title":"An Introduction to Bluetooth Low Energy. [Online]. Available: https:\/\/datatracker.ietf.org\/meeting\/interim-2016-t2trg-02\/materials\/slides-interim-2016-t2trg-2-7. [Accessed","author":"Heydon Robin","year":"2022","unstructured":"Robin Heydon . 2016. An Introduction to Bluetooth Low Energy. [Online]. Available: https:\/\/datatracker.ietf.org\/meeting\/interim-2016-t2trg-02\/materials\/slides-interim-2016-t2trg-2-7. [Accessed : 18 May 2022 ]. Robin Heydon. 2016. An Introduction to Bluetooth Low Energy. [Online]. Available: https:\/\/datatracker.ietf.org\/meeting\/interim-2016-t2trg-02\/materials\/slides-interim-2016-t2trg-2-7. [Accessed: 18 May 2022]."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00089"},{"key":"e_1_3_2_1_25_1","volume-title":"Black Hat USA Conference.","author":"Jasek S\u0142awomir","year":"2016","unstructured":"S\u0142awomir Jasek . 2016 . Gattacking Bluetooth smart devices . In Black Hat USA Conference. S\u0142awomir Jasek. 2016. Gattacking Bluetooth smart devices. In Black Hat USA Conference."},{"key":"e_1_3_2_1_26_1","volume-title":"Burglars\u2019 IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds. In 2020 IEEE Symposium on Security and Privacy (SP). 838\u2013854","author":"Jia Yan","year":"2020","unstructured":"Yan Jia , Luyi Xing , Yuhang Mao , Dongfang Zhao , XiaoFeng Wang , Shangru Zhao , and Yuqing Zhang . 2020 . Burglars\u2019 IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds. In 2020 IEEE Symposium on Security and Privacy (SP). 838\u2013854 . Yan Jia, Luyi Xing, Yuhang Mao, Dongfang Zhao, XiaoFeng Wang, Shangru Zhao, and Yuqing Zhang. 2020. Burglars\u2019 IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds. In 2020 IEEE Symposium on Security and Privacy (SP). 838\u2013854."},{"key":"e_1_3_2_1_27_1","volume-title":"PrivacyCon","author":"Korolova Aleksandra","year":"2017","unstructured":"Aleksandra Korolova and Vinod Sharma . 2017. Cross-App Tracking via Nearby Bluetooth Low Energy Devices . In PrivacyCon 2017 . Federal Trade Commission . Aleksandra Korolova and Vinod Sharma. 2017. Cross-App Tracking via Nearby Bluetooth Low Energy Devices. In PrivacyCon 2017. Federal Trade Commission."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889178"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"e_1_3_2_1_30_1","volume-title":"QN902x OTA Profile Guide. [Online]. Available: https:\/\/www.nxp.com\/docs\/en\/user-guide\/UM10993.pdf [Accessed","author":"NXP.","year":"2020","unstructured":"NXP. 2018. QN902x OTA Profile Guide. [Online]. Available: https:\/\/www.nxp.com\/docs\/en\/user-guide\/UM10993.pdf [Accessed 07 Feb 2020 ]. NXP. 2018. QN902x OTA Profile Guide. [Online]. Available: https:\/\/www.nxp.com\/docs\/en\/user-guide\/UM10993.pdf [Accessed 07 Feb 2020]."},{"key":"e_1_3_2_1_31_1","volume-title":"Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13). 527\u2013542.","author":"Pandita Rahul","unstructured":"Rahul Pandita , Xusheng Xiao , Wei Yang , William Enck , and Tao Xie . 2013. {WHYPER} : Towards Automating Risk Assessment of Mobile Applications . In Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13). 527\u2013542. Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie. 2013. {WHYPER}: Towards Automating Risk Assessment of Mobile Applications. In Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13). 527\u2013542."},{"key":"e_1_3_2_1_32_1","volume-title":"Available: https:\/\/developer.qualcomm.com\/qfile\/34081\/csr102x_otau_overview.pdf [Accessed","author":"Technologies Qualcomm","year":"2019","unstructured":"Qualcomm Technologies . 2016. OTAU CSR102x. [Online]. Available: https:\/\/developer.qualcomm.com\/qfile\/34081\/csr102x_otau_overview.pdf [Accessed 09 Aug 2019 ]. Qualcomm Technologies. 2016. OTAU CSR102x. [Online]. Available: https:\/\/developer.qualcomm.com\/qfile\/34081\/csr102x_otau_overview.pdf [Accessed 09 Aug 2019]."},{"key":"e_1_3_2_1_33_1","volume-title":"Bypassing Passkey Authentication in Bluetooth Low Energy.IACR Cryptology ePrint Archive 2013","author":"Rosa Tomas","year":"2013","unstructured":"Tomas Rosa . 2013. Bypassing Passkey Authentication in Bluetooth Low Energy.IACR Cryptology ePrint Archive 2013 ( 2013 ), 309. Tomas Rosa. 2013. Bypassing Passkey Authentication in Bluetooth Low Energy.IACR Cryptology ePrint Archive 2013 (2013), 309."},{"key":"e_1_3_2_1_34_1","volume-title":"Bluetooth: With Low Energy Comes Low Security. In 7th USENIX Workshop on Offensive Technologies, WOOT \u201913","author":"Ryan Mike","year":"2013","unstructured":"Mike Ryan . 2013 . Bluetooth: With Low Energy Comes Low Security. In 7th USENIX Workshop on Offensive Technologies, WOOT \u201913 , Washington, D.C., USA , August 13, 2013. https:\/\/www.usenix.org\/conference\/woot13\/workshop-program\/presentation\/ryan Mike Ryan. 2013. Bluetooth: With Low Energy Comes Low Security. In 7th USENIX Workshop on Offensive Technologies, WOOT \u201913, Washington, D.C., USA, August 13, 2013. https:\/\/www.usenix.org\/conference\/woot13\/workshop-program\/presentation\/ryan"},{"key":"e_1_3_2_1_35_1","unstructured":"Silicon Labs. 2018. AN1086: Using the Gecko Bootloader with the Silicon Labs Bluetooth Applications. [Online]. Available: https:\/\/www.silabs.com\/documents\/public\/application-notes\/an1086-gecko-bootloader-bluetooth.pdf [Accessed 04 May 2022].  Silicon Labs. 2018. AN1086: Using the Gecko Bootloader with the Silicon Labs Bluetooth Applications. [Online]. Available: https:\/\/www.silabs.com\/documents\/public\/application-notes\/an1086-gecko-bootloader-bluetooth.pdf [Accessed 04 May 2022]."},{"key":"e_1_3_2_1_36_1","volume-title":"28th USENIX Security Symposium USENIX Security 19)","author":"Sivakumaran Pallavi","year":"2019","unstructured":"Pallavi Sivakumaran and Jorge Blasco . 2019 . A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape . In 28th USENIX Security Symposium USENIX Security 19) . Pallavi Sivakumaran and Jorge Blasco. 2019. A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape. In 28th USENIX Security Symposium USENIX Security 19)."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 17th EAI International Conference on Security and Privacy in Communication Networks. Springer.","author":"Sivakumaran Pallavi","year":"2021","unstructured":"Pallavi Sivakumaran and Jorge Blasco Alis . 2021 . Whos Accessing My Data? Application-Level Access Control for Bluetooth Low Energy . In Proceedings of the 17th EAI International Conference on Security and Privacy in Communication Networks. Springer. Pallavi Sivakumaran and Jorge Blasco Alis. 2021. Whos Accessing My Data? Application-Level Access Control for Bluetooth Low Energy. In Proceedings of the 17th EAI International Conference on Security and Privacy in Communication Networks. Springer."},{"key":"e_1_3_2_1_38_1","volume-title":"AN4869 Application Note. [Online]. Available: https:\/\/www.st.com\/resource\/en\/application_note\/dm00293821.pdf [Accessed","author":"Microelectronics ST","year":"2022","unstructured":"ST Microelectronics . 2016. AN4869 Application Note. [Online]. Available: https:\/\/www.st.com\/resource\/en\/application_note\/dm00293821.pdf [Accessed 01 May 2022 ]. ST Microelectronics. 2016. AN4869 Application Note. [Online]. Available: https:\/\/www.st.com\/resource\/en\/application_note\/dm00293821.pdf [Accessed 01 May 2022]."},{"key":"e_1_3_2_1_39_1","volume-title":"Available: https:\/\/github.com\/STMicroelectronics\/BlueSTSDK_GUI_iOS [Accessed","author":"Microelectronics ST","year":"2022","unstructured":"ST Microelectronics . 2019. Blue STSDK. [Online]. Available: https:\/\/github.com\/STMicroelectronics\/BlueSTSDK_GUI_iOS [Accessed 03 May 2022 ]. ST Microelectronics. 2019. BlueSTSDK. [Online]. Available: https:\/\/github.com\/STMicroelectronics\/BlueSTSDK_GUI_iOS [Accessed 03 May 2022]."},{"key":"e_1_3_2_1_40_1","volume-title":"Getting started with Bluetooth Low Energy: tools and techniques for low-power networking. O\u2019Reilly Media","author":"Townsend Kevin","unstructured":"Kevin Townsend , Carles Cuf\u00ed , Robert Davidson , 2014. Getting started with Bluetooth Low Energy: tools and techniques for low-power networking. O\u2019Reilly Media , Inc . Kevin Townsend, Carles Cuf\u00ed, Robert Davidson, 2014. Getting started with Bluetooth Low Energy: tools and techniques for low-power networking. O\u2019Reilly Media, Inc."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423344"},{"key":"e_1_3_2_1_42_1","volume-title":"App. [Online]. Available: https:\/\/uk.pcmag.com\/gallery\/123522\/how-to-locate-your-friends-with-the-apple-find-my-app. [Accessed","author":"Whitney Lance","year":"2022","unstructured":"Lance Whitney . 2019. How to Locate Your Friends With the Apple \u2019Find My \u2019 App. [Online]. Available: https:\/\/uk.pcmag.com\/gallery\/123522\/how-to-locate-your-friends-with-the-apple-find-my-app. [Accessed : 03 Mar 2022 ]. Lance Whitney. 2019. How to Locate Your Friends With the Apple \u2019Find My\u2019 App. [Online]. Available: https:\/\/uk.pcmag.com\/gallery\/123522\/how-to-locate-your-friends-with-the-apple-find-my-app. [Accessed: 03 Mar 2022]."},{"key":"e_1_3_2_1_43_1","unstructured":"William\u00a0E Winkler. 1990. String Comparator Metrics and Enhanced Decision Rules in the Fellegi-Sunter Model of Record Linkage. (1990).  William\u00a0E Winkler. 1990. String Comparator Metrics and Enhanced Decision Rules in the Fellegi-Sunter Model of Record Linkage. (1990)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559372"},{"key":"e_1_3_2_1_45_1","volume-title":"Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Zhang Yue","year":"2020","unstructured":"Yue Zhang , Jian Weng , Rajib Dey , Yier Jin , Zhiqiang Lin , and Xinwen Fu . 2020 . Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks. In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, 37\u201354. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/zhang-yue Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, and Xinwen Fu. 2020. Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 37\u201354. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/zhang-yue"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517410"},{"key":"e_1_3_2_1_47_1","volume-title":"2016 AAAI Fall Symposium Series.","author":"Zimmeck Sebastian","year":"2016","unstructured":"Sebastian Zimmeck , Ziqi Wang , Lieyong Zou , Roger Iyengar , Bin Liu , Florian Schaub , Shomir Wilson , Norman Sadeh , Steven Bellovin , and Joel Reidenberg . 2016 . Automated analysis of privacy requirements for mobile apps . In 2016 AAAI Fall Symposium Series. Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Roger Iyengar, Bin Liu, Florian Schaub, Shomir Wilson, Norman Sadeh, Steven Bellovin, and Joel Reidenberg. 2016. Automated analysis of privacy requirements for mobile apps. In 2016 AAAI Fall Symposium Series."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354240"}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3595806","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:17Z","timestamp":1750183697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3595806"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":48,"alternative-id":["10.1145\/3579856.3595806","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3595806","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}