{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:03:04Z","timestamp":1755993784723,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T00:00:00Z","timestamp":1700438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,20]]},"DOI":"10.1145\/3689943.3695040","type":"proceedings-article","created":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T18:21:04Z","timestamp":1732213264000},"page":"109-123","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar Environments"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9847-7656","authenticated-orcid":false,"given":"Emiliia","family":"Geloczi","sequence":"first","affiliation":[{"name":"University of Passau, Passau, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7256-0387","authenticated-orcid":false,"given":"Henrich C.","family":"P\u00f6hls","sequence":"additional","affiliation":[{"name":"University of Passau, Passau, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9650-7698","authenticated-orcid":false,"given":"Felix","family":"Klement","sequence":"additional","affiliation":[{"name":"University of Passau, Passau, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6468-809X","authenticated-orcid":false,"given":"Joachim","family":"Posegga","sequence":"additional","affiliation":[{"name":"University of Passau, Passau, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3608-874X","authenticated-orcid":false,"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[{"name":"University of Passau, Passau, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC55528.2022.9913056"},{"key":"e_1_3_2_1_2_1","unstructured":"Support Apple. 2023. Use private Wi-Fi addresses on iPhone iPad iPod touch and Apple Watch. https:\/\/support.apple.com\/guide\/security\/wi-fi-privacy-secb9cb3140c\/web."},{"key":"e_1_3_2_1_3_1","unstructured":"Apple Developer Documentation. 2019. Framework CoreBluetooth. https:\/\/developer.apple.com\/documentation\/corebluetooth."},{"key":"e_1_3_2_1_4_1","unstructured":"Apple Developer Documentation. 2019. Framework CoreData. https:\/\/developer.apple.com\/documentation\/coredata."},{"key":"e_1_3_2_1_5_1","unstructured":"Apple Developer Documentation. 2019. Framework SwiftUI. https:\/\/developer.apple.com\/documentation\/swiftui\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Apple Developer Documentation. 2019. Framework UIKit. https:\/\/developer.apple.com\/documentation\/uikit."},{"key":"e_1_3_2_1_7_1","unstructured":"Arstechnica. 2019. Airbnb guest found hidden surveillance camera by scanning Wi-Fi Network. https:\/\/arstechnica.com\/information-technology\/2019\/04\/airbnb-guest-found-hidden-surveillance-camera-by-scanning-wi-fi-network\/."},{"key":"e_1_3_2_1_8_1","volume-title":"12th USENIX Security Symposium (USENIX Security 03)","author":"Bellardo John","year":"2003","unstructured":"John Bellardo and Stefan Savage. 2003. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In 12th USENIX Security Symposium (USENIX Security 03)."},{"key":"e_1_3_2_1_9_1","unstructured":"Bluez.org. 2019. BlueZ. http:\/\/www.bluez.org."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2023.107770"},{"key":"e_1_3_2_1_11_1","volume-title":"Augmented reality: an overview. Handbook of augmented reality","author":"Carmigniani Julie","year":"2011","unstructured":"Julie Carmigniani and Borko Furht. 2011. Augmented reality: an overview. Handbook of augmented reality (2011), 3--46."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196509"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR.2002.1115123"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT48130.2020.9221420"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3631432"},{"key":"e_1_3_2_1_16_1","unstructured":"Amy Gunia. 2019. Hundreds of motel guests were secretly filmed and live-streamed online. https:\/\/edition.cnn.com\/2019\/03\/20\/asia\/south-korea-hotel-spy-cam-intl\/index.html."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSN57253.2022.00109"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3467683"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3564632"},{"key":"e_1_3_2_1_20_1","unstructured":"Kolya Hnatyuk. 2023. Internet of Things (IoT) Statistics: 2022\/2023. https:\/\/marketsplash.com\/internet-of-things-statistics."},{"key":"e_1_3_2_1_21_1","unstructured":"IEEE. 2023. MA-L. https:\/\/standards.ieee.org\/products-programs\/regauth\/oui\/."},{"key":"e_1_3_2_1_22_1","unstructured":"Sagar Joshi. 2023. 70 IoT Statistics to Unveil the Past Present and Future of IoT. https:\/\/learn.g2.com\/IoT-statistics. accessed: 15.06.2023."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3565287.3617905"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN53696.2022.9843203"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210332"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CAC57257.2022.10054963"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3569505"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Karim Lounis Steven H. H. Ding and Mohammad Zulkernine. 2022. Cut It: Deauthentication Attacks on\u00a0Protected Management Frames in\u00a0WPA2 and\u00a0WPA3. In Foundations and Practice of Security Esma A\u00efmeur Maryline Laurent Reda Yaich Beno\u00eet Dupont and Joaquin Garcia-Alfaro (Eds.). Springer International Publishing Cham 235--252.","DOI":"10.1007\/978-3-031-08147-7_16"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103486"},{"key":"e_1_3_2_1_30_1","unstructured":"MAC Address Lookup API. 2023. https:\/\/www.macvendorlookup.com\/api."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.103043"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2022.3187065"},{"key":"e_1_3_2_1_33_1","unstructured":"Plume. 2022. Plume IQ 1H 2022 Smart Home Market Report."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534593"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3485941"},{"key":"e_1_3_2_1_36_1","unstructured":"Scapy.net. 2019. Scapy. https:\/\/scapy.net."},{"volume-title":"31st USENIX Security Symposium. 1095--1112","author":"Sharma Rahul Anand","key":"e_1_3_2_1_37_1","unstructured":"Rahul Anand Sharma, Elahe Soltanaghaei, and Anthony et al. Rowe. 2022. Lumos: Identifying and Localizing Diverse Hidden IoTDevices in an Unfamiliar Environment. In 31st USENIX Security Symposium. 1095--1112."},{"key":"e_1_3_2_1_38_1","volume-title":"FindSpy: A Wireless Camera Detection System Based on Pre-Trained Transformers. 2023 IEEE Symposium on Computers and Communications (ISCC)","author":"Shi Zhixin","year":"2023","unstructured":"Zhixin Shi, Hao Wu, Jing Zhang, Meng Zhang, and Wei-Jung Huang. 2023. FindSpy: A Wireless Camera Detection System Based on Pre-Trained Transformers. 2023 IEEE Symposium on Computers and Communications (ISCC) (2023), 816--822. https:\/\/api.semanticscholar.org\/CorpusID:261327985"},{"key":"e_1_3_2_1_39_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Singh Akash Deep","year":"2021","unstructured":"Akash Deep Singh, Luis Garcia, Joseph Noor, and Mani Srivastava. 2021. I Always Feel Like Somebodytextquoterights Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1829--1846. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/singh"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3596263"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS51098.2021.9352896"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689260"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.20870\/IJVR.2010.9.2.2767"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833643"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560669"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2024.102283"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 23rd Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689943.3695040","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3689943.3695040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T02:16:01Z","timestamp":1755915361000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689943.3695040"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,20]]},"references-count":46,"alternative-id":["10.1145\/3689943.3695040","10.1145\/3689943"],"URL":"https:\/\/doi.org\/10.1145\/3689943.3695040","relation":{},"subject":[],"published":{"date-parts":[[2023,11,20]]},"assertion":[{"value":"2024-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}