, IEEE Standard for Local and Metropolitan Area Networks: Overview and Architecture, IEEE Std, vol.802, pp.1-74, 2014.
, Models -The iPhone Wiki, pp.2019-2026, 2019.
, Apple Notification Center Service (ANCS) Specification, pp.2019-2026, 2014.
Tracking Anonymized Bluetooth Devices, Proceedings on Privacy Enhancing Technologies, vol.3, pp.50-65, 2019. ,
Active Behavioral Fingerprinting of Wireless Devices, Proceedings of the First ACM Conference on Wireless Network Security (WiSec '08), pp.56-61, 2008. ,
Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism, Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02394629
Uncovering privacy leakage in BLE network traffic of wearable fitness trackers, Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, pp.99-104, 2016. ,
How unique is your web browser, International Symposium on Privacy Enhancing Technologies Symposium, pp.1-18, 2010. ,
Protecting Privacy of BLE Device Users, USENIX Security Symposium, pp.1205-1221, 2016. ,
, USB Implementers Forum, pp.2019-2026, 2019.
Near-optimal fingerprinting with constraints, Proceedings on Privacy Enhancing Technologies, vol.4, pp.470-487, 2016. ,
To Extend or Not to Extend: On the Uniqueness of Browser Extensions and Web Logins, Proceedings of the 2018 Workshop on Privacy in the Electronic Society (WPES'18), pp.14-27, 2018. ,
bluepy -a Bluetooth LE interface for Python, pp.2019-2026, 2014. ,
Security Weaknesses in Bluetooth, Topics in Cryptology -CT-RSA, pp.176-191, 2001. ,
This Is Not a Post About BLE, Introducing BLEAH, pp.2019-2026, 2017. ,
Handoff All Your Privacy -A Review of Apple's Bluetooth Low Energy Continuity Protocol, Proceedings on Privacy Enhancing Technologies, vol.4, pp.34-53, 2019. ,
A study of MAC address randomization in mobile devices and when it fails, Proceedings on Privacy Enhancing Technologies, vol.4, pp.365-383, 2017. ,
Defeating MAC Address Randomization Through Timing Attacks, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec '16), pp.15-20, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01330476
An empirical study of passive 802.11 device fingerprinting, 2012 32nd International Conference on Distributed Computing Systems Workshops. IEEE, pp.593-602, 2012. ,
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting, 2013 IEEE Symposium on Security and Privacy, pp.541-555, 2013. ,
Bluetooth Core Specification v4, pp.2019-2026, 2010. ,
GATT Specification Supplement v1, pp.2019-2026, 2017. ,
Assigned Numbers -Company Identifiers, pp.2019-2026, 2019. ,
Bluetooth Core Specification v5, vol.1, pp.2019-2026, 2019. ,
Bluetooth Market Update, pp.2019-2026, 2019. ,
, GATT Specifications, pp.2019-2026, 2019.
MiBand2 -Python library to work with Xiaomi MiBand 2, pp.2019-2026, 2019. ,
Why MAC Address Randomization is Not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIA CCS '16), pp.413-424, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01282900