Difference between revisions of "Tracking Anonymized Bluetooth Devices (Q4554)"
Jump to navigation
Jump to search
(Created a new Item: #quickstatements; #temporary_batch_1588626918625) |
(Created claim: quote (P203): By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.) |
||||||||||||||
| (4 intermediate revisions by the same user not shown) | |||||||||||||||
| Property / DOI | |||||||||||||||
| + | |||||||||||||||
| Property / DOI: 10.2478/popets-2019-0036 / rank | |||||||||||||||
| + | Normal rank | ||||||||||||||
| Property / date | |||||||||||||||
| + | 2019
| ||||||||||||||
| Property / date: 2019 / rank | |||||||||||||||
| + | Normal rank | ||||||||||||||
| Property / instance of | |||||||||||||||
| + | |||||||||||||||
| Property / instance of: scholarly article / rank | |||||||||||||||
| + | Normal rank | ||||||||||||||
| Property / concerns | |||||||||||||||
| + | |||||||||||||||
| Property / concerns: Bluetooth Low Energy / rank | |||||||||||||||
| + | Normal rank | ||||||||||||||
| Property / quote | |||||||||||||||
| + | By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization. | ||||||||||||||
| Property / quote: By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization. / rank | |||||||||||||||
| + | Normal rank | ||||||||||||||
Latest revision as of 21:51, 14 May 2020
Statements
2019
0 references
By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.
0 references