{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T17:47:54Z","timestamp":1765820874527,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,3]]},"DOI":"10.1145\/3764919.3770878","type":"proceedings-article","created":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T17:41:23Z","timestamp":1765820483000},"page":"45-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Decentralized Trajectory Matching for Revealing Unauthorized Stalking by Bluetooth Trackers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5376-1121","authenticated-orcid":false,"given":"Ben","family":"Galon","sequence":"first","affiliation":[{"name":"Lumen, Tel Aviv, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6056-595X","authenticated-orcid":false,"given":"Yaron","family":"Kanza","sequence":"additional","affiliation":[{"name":"AT&amp;T, Bedminster, New Jersey, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3392-1864","authenticated-orcid":false,"given":"Eliyahu","family":"Safra","sequence":"additional","affiliation":[{"name":"Ariel University, Ariel, Israel"}]}],"member":"320","published-online":{"date-parts":[[2025,12,15]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"240","volume-title":"2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService)","author":"Antunes M.","unstructured":"M. Antunes, D. Gomes, and R. L. Aguiar. Knee\/elbow estimation based on first derivative threshold. In 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService), pages 237\u2013240. IEEE, 2018."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0036"},{"key":"e_1_3_2_1_3_1","volume-title":"Security and Privacy Workshops (SPW). IEEE","author":"Briggs J.","year":"2022","unstructured":"J. Briggs and C. Geeng. BLE-Doubt: smartphone-based detection of malicious bluetooth trackers. In Security and Privacy Workshops (SPW). IEEE, 2022."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108712"},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of the 22nd ACM International Conf. on Knowledge Discovery and Data Mining","author":"Chen T.","year":"2016","unstructured":"T. Chen and C. Guestrin. XGBoost: A scalable tree boosting system. In Proc. of the 22nd ACM International Conf. on Knowledge Discovery and Data Mining, 2016."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873594"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139958.3139979"},{"key":"e_1_3_2_1_8_1","first-page":"76","volume-title":"Proceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems","author":"Dasu T.","year":"2018","unstructured":"T. Dasu, Y. Kanza, and D. Srivastava. Geofences in the sky: herding drones with blockchains and 5G. In Proceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pages 73\u201376, 2018."},{"key":"e_1_3_2_1_9_1","first-page":"23","volume-title":"Proc. Symposium on Foundations and Applications of Blockchain","volume":"1","author":"Dasu T.","year":"2018","unstructured":"T.Dasu, Y. Kanza, and D. Srivastava. Unchain your blockchain. In Proc. Symposium on Foundations and Applications of Blockchain, volume 1, pages 16\u201323, 2018."},{"key":"e_1_3_2_1_10_1","first-page":"7","volume-title":"Proceedings of the Second Workshop on Situating Network Infrastructure with People, Practices, and Beyond","author":"Despres T.","year":"2023","unstructured":"T. Despres, N. Davis, P. Dutta, and D. Wagner. Detagtive: Linking macs to protect against malicious BLE trackers. In Proceedings of the Second Workshop on Situating Network Infrastructure with People, Practices, and Beyond, pages 1\u20137, 2023."},{"key":"e_1_3_2_1_11_1","first-page":"13","volume-title":"Proceedings of the 2018 CHI conference on human factors in computing systems","author":"Freed D.","year":"2018","unstructured":"D. Freed, J. Palmer, D. Minchala, K. Levy, T. Ristenpart, and N. Dell. \"a stalker's paradise\" how intimate partner abusers exploit technology. In Proceedings of the 2018 CHI conference on human factors in computing systems, pages 1\u201313, 2018."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-014-0216-4"},{"key":"e_1_3_2_1_14_1","volume-title":"Public-key cryptography and password protocols. ACM Transactions on Information and System Security (TISSEC), 2(3)","author":"Halevi S.","year":"1999","unstructured":"S. Halevi and H. Krawczyk. Public-key cryptography and password protocols. ACM Transactions on Information and System Security (TISSEC), 2(3), 1999."},{"key":"e_1_3_2_1_15_1","first-page":"137","volume-title":"International Symposium on Location-and Context-Awareness","author":"Hay S.","unstructured":"S. Hay and R. Harle. Bluetooth tracking without discoverability. In International Symposium on Location-and Context-Awareness, pages 120\u2013137. Springer, 2009."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528546"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of the 14th ACM Conf. on Security and Privacy in Wireless and Mobile Networks","author":"Heinrich A.","year":"2021","unstructured":"A. Heinrich, M. Stute, and M. Hollick. Openhaystack: a framework for tracking personal bluetooth devices via apple's massive find my network. In Proc. of the 14th ACM Conf. on Security and Privacy in Wireless and Mobile Networks, 2021."},{"key":"e_1_3_2_1_18_1","volume-title":"Who can find my devices? security and privacy of apple's crowd-sourced bluetooth location tracking system. arXiv preprint arXiv:2103.02282","author":"Heinrich A.","year":"2021","unstructured":"A. Heinrich, M. Stute, T. Kornhuber, and M. Hollick. Who can find my devices? security and privacy of apple's crowd-sourced bluetooth location tracking system. arXiv preprint arXiv:2103.02282, 2021."},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of the second ACM SIGCOMM workshop on Networking, systems, and applications on mobile handhelds","author":"Jaiswal S.","year":"2010","unstructured":"S. Jaiswal and A. Nandi. Trust no one: A decentralized matching service for privacy in location based services. In Proc. of the second ACM SIGCOMM workshop on Networking, systems, and applications on mobile handhelds, 2010."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996913.2997010"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems","author":"Kanza Y.","year":"2018","unstructured":"Y. Kanza and E. Safra. Cryptotransport: blockchain-powered ride hailing while preserving privacy, pseudonymity and trust. In Proc. of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2018."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0212-5"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-006-0095-2"},{"key":"e_1_3_2_1_24_1","volume-title":"Handoff all your privacy: A review of apple's bluetooth low energy continuity protocol. arXiv preprint arXiv:1904.10600","author":"Martin J.","year":"2019","unstructured":"J. Martin, D. Alpuche, K. Bodeman, L. Brown, E. Fenske, L. Foppe, T. Mayberry, E. C. Rye, B. Sipes, and S. Teplov. Handoff all your privacy: A review of apple's bluetooth low energy continuity protocol. arXiv preprint arXiv:1904.10600, 2019."},{"key":"e_1_3_2_1_25_1","first-page":"2201","volume-title":"Proceedings of the 2017 CHI conference on human factors in computing systems","author":"Matthews T.","year":"2017","unstructured":"T. Matthews, K. O'Leary, A. Turner, M. Sleeper, J. P. Woelfer, M. Shelton, C. Manthorne, E. F. Churchill, and S. Consolvo. Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Proceedings of the 2017 CHI conference on human factors in computing systems, pages 2189\u20132201, 2017."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings on Privacy Enhancing Technologies","author":"Mayberry T.","year":"2023","unstructured":"T. Mayberry, E.-O. Blass, and E. Fenske. Blind my-an improved cryptographic protocol to prevent stalking in apple's find my network. Proceedings on Privacy Enhancing Technologies, 2023."},{"key":"e_1_3_2_1_27_1","first-page":"186","volume-title":"Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society","author":"Mayberry T.","unstructured":"T. Mayberry, E. Fenske, D. Brown, J. Martin, C. Fossaceca, E. C. Rye, S. Teplov, and L. Foppe. Who tracks the trackers? circumventing apple's anti-tracking alerts in the find my network. In Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, pages 181\u2013186. ACM, 2021."},{"key":"e_1_3_2_1_28_1","first-page":"9","volume-title":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","author":"M\u00fcller K. O.","unstructured":"K. O. M\u00fcller, L. Bienz, B. Rodrigues, C. Feng, and B. Stiller. Homescout: Anti-stalking mobile app for bluetooth low energy devices. In 2023 IEEE 48th Conference on Local Computer Networks (LCN), pages 1\u20139. IEEE, 2023."},{"key":"e_1_3_2_1_29_1","first-page":"8440","volume-title":"IECON 2017-43rd Annual Conference of the IEEE Industrial Electronics Society","author":"Ndzukula S.","unstructured":"S. Ndzukula, T. Ramotsoela, B. J. Silva, and G. P. Hancke. A bluetooth low energy based system for personnel tracking. In IECON 2017-43rd Annual Conference of the IEEE Industrial Electronics Society, pages 8435\u20138440. IEEE, 2017."},{"key":"e_1_3_2_1_30_1","volume-title":"Tech. Rep","author":"Paverd A.","year":"2014","unstructured":"A. Paverd, A. Martin, and I. Brown. Modelling and automatically analysing privacy properties for honest-but-curious adversaries. Tech. Rep, 2014."},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 2nd ACM SIGSPATIAL Workshop on Recommendations for Location-based Services and Social Networks","author":"Pesara A. C.","year":"2018","unstructured":"A. C. Pesara, V. Patil, and P. K. Atrey. Secure computing of GPS trajectory similarity: a review. In Proceedings of the 2nd ACM SIGSPATIAL Workshop on Recommendations for Location-based Services and Social Networks, 2018."},{"key":"e_1_3_2_1_32_1","first-page":"3","volume-title":"2016 IEEE SENSORS","author":"Rheinl\u00e4nder C. C.","unstructured":"C. C. Rheinl\u00e4nder and N. Wehn. Precise synchronization time stamp generation for bluetooth low energy. In 2016 IEEE SENSORS, pages 1\u20133. IEEE, 2016."},{"key":"e_1_3_2_1_33_1","first-page":"388","volume-title":"Proc. of the 11th International Workshop on Fast Software Encryption","author":"Rogaway P.","unstructured":"P. Rogaway and T. Shrimpton. Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In Proc. of the 11th International Workshop on Fast Software Encryption, pages 371\u2013388. Springer, 2004."},{"issue":"1","key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","DOI":"10.1080\/13658816.2012.667104","article-title":"Ad hoc matching of vectorial road networks","volume":"27","author":"Safra E.","year":"2013","unstructured":"E. Safra, Y. Kanza, Y. Sagiv, and Y. Doytsher. Ad hoc matching of vectorial road networks. International Journal of Geographical Information Science, 27(1), 2013.","journal-title":"International Journal of Geographical Information Science"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings on Privacy Enhancing Technologies","author":"Shafqat N.","year":"2023","unstructured":"N. Shafqat, N. Gerzon, M. Van Nortwick, V. Sun, A. Mislove, and A. Ranganathan. Track you: A deep dive into safety alerts for apple airtags. Proceedings on Privacy Enhancing Technologies, 2023."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0331-0"},{"key":"e_1_3_2_1_37_1","volume-title":"Clock synchronization for wireless sensor networks: a survey. Ad hoc networks, 3(3):281\u2013323","author":"Sundararaman B.","year":"2005","unstructured":"B. Sundararaman, U. Buy, and A. D. Kshemkalyani. Clock synchronization for wireless sensor networks: a survey. Ad hoc networks, 3(3):281\u2013323, 2005."},{"key":"e_1_3_2_1_38_1","first-page":"88","volume-title":"Cambridge International Workshop on Security Protocols","author":"Turk K. I.","unstructured":"K. I. Turk, A. Hutchings, and A. R. Beresford. Can't keep them away: The failures of anti-stalkingp rotocols in personal item tracking devices. In Cambridge International Workshop on Security Protocols, pages 78\u201388. Springer, 2023."},{"key":"e_1_3_2_1_39_1","first-page":"104","volume-title":"2018 IEEE International Conference on Data Mining Workshops (ICDMW)","author":"Victor F.","unstructured":"F. Victor and S. Zickau. Geofences on the blockchain: Enabling decentralized location-based services. In 2018 IEEE International Conference on Data Mining Workshops (ICDMW), pages 97\u2013104. IEEE, 2018."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3147478"},{"key":"e_1_3_2_1_41_1","volume-title":"Proc. of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks","author":"Weller M.","year":"2020","unstructured":"M. Weller, J. Classen, F. Ullrich, D. Wa\u00dfmann, and E. Tews. Lost and found: stopping bluetooth finders from leaking private information. In Proc. of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020."},{"key":"e_1_3_2_1_42_1","first-page":"1128","volume-title":"2010 International Conference on Electrical and Control Engineering","author":"Zuohu L.","unstructured":"L. Zuohu, H. Jinming, L. Jianwen, and Z. Qile. High precision clock synchronization and control based on GPS. In 2010 International Conference on Electrical and Control Engineering, pages 1125\u20131128. IEEE, 2010."}],"event":{"name":"GeoIndustry '25: 4th ACM SIGSPATIAL International Workshop on Spatial Big Data and AI for Industrial Applications","sponsor":["SIGSPATIAL ACM Special Interest Group on Spatial Information"],"location":"The Graduate Hotel Minneapolis Minneapolis MN USA","acronym":"GeoIndustry '25"},"container-title":["Proceedings of the 4th ACM SIGSPATIAL International Workshop on Spatial Big Data and AI for Industrial Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3764919.3770878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T17:43:03Z","timestamp":1765820583000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3764919.3770878"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,3]]},"references-count":42,"alternative-id":["10.1145\/3764919.3770878","10.1145\/3764919"],"URL":"https:\/\/doi.org\/10.1145\/3764919.3770878","relation":{},"subject":[],"published":{"date-parts":[[2025,11,3]]},"assertion":[{"value":"2025-12-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}