, In terms of applications, bandwidth, power consumption and range
, Signals are transmitted at about 433 MHz in Europe (see Figure II.2), and at 315 MHz in most other parts of the world
, During our experiment, we witnessed a range of about fifty meters
, To minimize the privacy implications that this experiment can raise, we only collected TPMS messages emitted by a car at our disposal. 2. Especially, with Eun-Jeong Shin, vol.237
, We left manufacturers time to react to our solicitations
, After having reviewed their systems/protocols. 5. They did not even respond to our e-mails
Handoff All Your Privacy -A Review of Apple's Bluetooth Low Energy Continuity Protocol, Proceedings on Privacy Enhancing Technologies, vol.2019, pp.34-53, 2019. ,
, GATT Specification Supplement v1, Bluetooth Special Interest Group, vol.1, pp.2020-2024, 2019.
Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols, Proceedings on Privacy Enhancing Technologies, vol.2020, pp.26-46, 2020. ,
URL : https://hal.archives-ouvertes.fr/hal-02394619
Valkyrie: A Generic Framework for Verifying Privacy Provisions in Wireless Networks, Proceedings of the 13th Conference on Security and Privacy in Wireless and Mobile Networks, pp.278-283, 2020. ,
URL : https://hal.archives-ouvertes.fr/hal-02651398
DEMO: Venom: a Visual and Experimental Bluetooth Low Energy Tracking System, Proceedings of the 13th Conference on Security and Privacy in Wireless and Mobile Networks, pp.346-348, 2020. ,
URL : https://hal.archives-ouvertes.fr/hal-02651359
Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism, MobiQuitous 2019 -16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp.444-453, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02394629
DEMO: Himiko: A Human Interface for Monitoring and Inferring Knowledge on Bluetooth-Low-Energy Objects, Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, pp.292-293, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02154148
Detecting smartphone state changes through a Bluetooth based timing attack, Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp.154-159, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01870011
Fingerprinting Bluetooth-Low-Energy Devices Based on the Generic Attribute Profile, Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, pp.24-31, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02359914
Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism, Atelier sur la Protection de la Vie Privée (APVP), 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02394629
Detecting smartphone state changes through a Bluetooth based timing attack, Atelier sur la Protection de la Vie Privée (APVP), 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01870011
Protection de la Vie Privée dans les Communications Sans Fil de l'Internet des Objets (IoT), Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), 2018. ,
POSTER: Preserving Privacy in Wireless Communications of the Internet of Things (IoT), Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), 2018. ,
Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols, Annual seminar of the Inria PRIVATICS team, 2020. ,
URL : https://hal.archives-ouvertes.fr/hal-02394619
DEMO: Himiko: A Human Interface for Monitoring and Inferring Knowledge on Bluetooth-Low-Energy Objects, Salon de l'Internet Des Objets (SIDO), 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02154148
Privacy Threats from the Bluetooth Low Energy Service Discovery Mechanism, Annual seminar of the Inria PRIVATICS team, 2019. ,
Detection of Bluetooth surveillance systems, Presentation for Inria EPI: Data and Algorithmic Transparency and Accountability (DATA), 2018. ,
Privacy concerns in IoT radio communications, Pitch for the INSA Lyon -SPIE ICS IoT chair, 2018. ,
Wi-Fi Scanner: How many data can be collected on your smartphone, The Web Conference, 2018. ,
Preserving Privacy in Wireless Communications of the Internet of Things (IoT), 2018. ,
Valkyrie -A generic framework for verifying privacy provisions in wireless networks, pp.2020-2024, 2020. ,
URL : https://hal.archives-ouvertes.fr/hal-02651398
Joker -A Wireshark dissector for Bluetooth Low Energy (BLE) advertisement packets of Apple Continuity, Microsoft CDP and Garmin proprietary protocols, pp.2020-2024, 2020. ,
, Internet of Things (IoT) connected devices installed base worldwide from, Statistica, pp.2020-2023, 2015.
, Frontières numériques et savoir. Editions L'Harmattan, 2016.
Data Security and Privacy in the IoT, EDBT, vol.2016, pp.1-3, 2016. ,
La vie privée, un problème de vieux cons? FYP editions, 2010. ,
I've got nothing to hide and other misunderstandings of privacy, San Diego L. Rev, vol.44, p.745, 2007. ,
REPORT with recommendations to the Commission on Civil Law Rules on Robotics, pp.2020-2025, 2017. ,
Universal declaration of human rights, UN General Assembly, vol.302, issue.2, 1948. ,
The right to privacy, Harvard law review, pp.193-220, 1890. ,
Privacy and freedom, Washington and Lee Law Review, vol.25, issue.1, p.166, 1968. ,
M2M security: Challenges and solutions, IEEE Communications Surveys & Tutorials, vol.18, issue.2, pp.1241-1254, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01236511
Talos: Encrypted query processing for the internet of things, Proceedings of the 13th ACM conference on embedded networked sensor systems, pp.197-210, 2015. ,
Lightweight encryption for smart home, 11th International Conference on Availability, Reliability and Security (ARES), pp.382-388, 2016. ,
Privacy mediators: Helping IoT cross the chasm, Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, pp.39-44, 2016. ,
SecKit: a model-based security toolkit for the internet of things. computers & security, vol.54, pp.60-76, 2015. ,
Intelligent agents meet the semantic web in smart spaces, IEEE Internet computing, vol.8, issue.6, pp.69-79, 2004. ,
, Bluetooth Core Specification v5.2, Bluetooth Special Interest Group, pp.2020-2023, 2019.
, Bluetooth Core Specification v4.0, Bluetooth Special Interest Group, pp.2020-2024, 2010.
Bluetooth Technology Protecting Your Privacy, 2015. ,
, , pp.2020-2025
, IEEE Standard for Local and Metropolitan Area Networks: Overview and Architecture, IEEE Std, vol.802, pp.1-74, 2014.
, Generic Access Profile -Assigned Numbers, Bluetooth Special Interest Group, pp.2020-2025, 2020.
A universally unique identifier (uuid) urn namespace, 2005. ,
, Bluetooth Special Interest Group. GATT Specifications -GATT Services, pp.2020-2024, 2020.
, , pp.2020-2025, 2020.
uuidgen -Create a new UUID value, pp.2020-2025, 2019. ,
, Bluetooth Special Interest Group. GATT Specifications, pp.2020-2024, 2019.
, Bluetooth Special Interest Group. Device Information -GATT Ser
, Bluetooth Special Interest Group. Battery Service -GATT Ser
, Xml/Services/org.bluetooth.service.battery _ service, pp.2020-2025
Mathieu Cunche -Associate Professor, INSA-Lyon -CITI, Inria -Privatics, pp.2020-2025, 2020. ,
Guillaume Celosia -PhD Student @ CITI Lab -Inria, pp.2020-2025, 2020. ,
, A comparison of wpan technologies. CSE 237A, vol.20, 2008.
GNU radio: tools for exploring the radio frequency spectrum, Linux journal, issue.122, p.4, 2004. ,
, Philippe Biondi and the Scapy community. Scapy -Packet crafting for Python2 and Python3. 2020, pp.2020-2025
HackRF, an open source SDR platform, pp.2020-2025, 2016. ,
Ubertooth One: an open source Bluetooth test tool, pp.2020-2025, 2016. ,
How stores use your phone's WiFi to track your shopping habits, pp.2020-2023, 2013. ,
Eavesdropping whilst you're shopping: Balancing personalisation and privacy in connected retail spaces, 2018. ,
Protecting privacy of {BLE} device users, 25th USENIX Security Symposium (USENIX Security 16), pp.1205-1221, 2016. ,
Iotscanner: Detecting privacy threats in iot neighborhoods, Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, pp.23-30, 2017. ,
A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic, 2017. ,
Coming Apart? Cultural Distances in the United States Over Time, National Bureau of Economic Research, 2018. ,
, Srikanth Sundaresan, Arvind Narayanan, and Nick Feamster. Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic, 2017.
Bluetooth positioning using RSSI and triangulation methods, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), pp.837-842, 2013. ,
Mozilla Location Service (MLS). 2020. URL https:// location.services.mozilla, pp.2020-2025 ,
Getting Started with iBeacon -Version 1.0, pp.2020-2025, 2014. ,
Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM conference on embedded network sensor systems, pp.281-294, 2012. ,
IdentityLink: userdevice linking through visual and RF-signal cues, Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp.529-539, 2014. ,
Against the law: Countering lawful abuses of digital surveillance, 2016. ,
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study, USENIX Security Symposium, vol.10, 2010. ,
Content control: Digital watermarking and fingerprinting, 2012. ,
Techniques for fraud monitoring and detection using application fingerprinting, US Patent, vol.8, p.278, 2014. ,
Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems, NDSS, 2016. ,
Wireless device identification with radiometric signatures, Proceedings of the 14th ACM international conference on Mobile computing and networking, pp.116-127, 2008. ,
Identifying wireless users via transmitter imperfections, IEEE Journal on selected areas in communications, vol.29, issue.7, pp.1469-1479, 2011. ,
Fingerprinting Wi-Fi devices using software defined radios, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp.3-14, 2016. ,
Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp.413-424, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01282900
Privacy-aware personalized content for the smart home, US Patent, vol.10, p.98, 2019. ,
, Assigned Numbers for Baseband, Bluetooth Special Interest Group, pp.2020-2025, 2020.
Security and privacy issues for an IoT based smart home, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp.1292-1297, 2017. ,
A study of MAC address randomization in mobile devices and when it fails, Proceedings on Privacy Enhancing Technologies, vol.2017, pp.365-383, 2017. ,
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era, HotOS, 2007. ,
Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing, USENIX Security Symposium, pp.55-70, 2007. ,
Privacy by design -Principles of privacy-aware ubiquitous systems, International conference on Ubiquitous Computing, pp.273-291 ,
, , 2001.
Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis, Mobile Networks and Applications, vol.10, issue.3, pp.315-325, 2005. ,
iOS 8 to stymie trackers and marketers with MAC address randomization, 2014. ,
, Android Open Source Project, pp.2020-2025, 2020.
Privacy and your app, 2015. ,
iwlwifi: mvm: support random MAC address for scanning. Linux commit effd05ac479b, 2014. ,
Wireless networking in Windows 10, Windows Hardware Engineering Community conference (WinHEC), 2015. ,
, 802.11aq-2018 -IEEE Standard for Information technology -Telecommunications and information exchange between systems Local and metropolitan area networks -Specific requirements Part, vol.11, 2018.
Protecting your daily in-home activity information from a wireless snooping attack, Proceedings of the 10th international conference on Ubiquitous computing, pp.202-211, 2008. ,
Overcoming invasion of privacy in smart home environment with synthetic packet injection, 2015 TRON Symposium (TRONSHOW), pp.1-7, 2015. ,
Analysing the privacy policies of Wi-Fi trackers, Proceedings of the 2014 workshop on physical analytics, pp.39-44, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00968585
How talkative is your mobile device? An experimental study of Wi-Fi probe requests, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp.1-6, 2015. ,
Defeating MAC address randomization through timing attacks, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp.15-20, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01330476
Tracking anonymized bluetooth devices, Proceedings on Privacy Enhancing Technologies, vol.2019, pp.50-65, 2019. ,
The internet of things: How the next evolution of the internet is changing everything, vol.1, pp.1-11, 2011. ,
Internet of things (IoT). IoT Agenda, 2016. ,
Private memoirs of a smart meter, Proceedings of the 2nd ACM workshop on embedded sensing systems for energy-efficiency in building, pp.61-66, 2010. ,
, Privacy in the Internet of Things: threats and challenges. Security and Communication Networks, vol.7, pp.2728-2742, 2014.
Vision and challenges for realising the Internet of Things, Cluster of European Research Projects on the Internet of Things, vol.3, pp.34-36, 2010. ,
The Gurus Speak. Pew Research Center, 2014. ,
Privacy challenges in the quantified self movement -an EU perspective, Proceedings on privacy enhancing technologies, vol.2016, pp.315-334, 2016. ,
Fitness trackers: fit for health but unfit for security and privacy, 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), pp.19-24, 2017. ,
Location privacy in pervasive computing, IEEE Pervasive computing, vol.2, issue.1, pp.46-55, 2003. ,
Proposal for a Regulation on Privacy and Electronic Communications, pp.2020-2023, 2017. ,
, Privacy Impact Assessment (PIA) -Application to IoT devices, pp.2020-2023, 2018.
, Working Party 223. Opinion 8/2014 on the on Recent Developments on the Internet of Things, pp.2020-2023, 2014.
Qwant -The search engine that respects your privacy, pp.2020-2025, 2020. ,
Groupe La Poste: les Français et les objets connectés, pp.2020-2023, 2016. ,
Surveillance: The hidden ways you're tracked, pp.2020-2023, 2014. ,
NSA tracking cellphone locations worldwide, Snowden documents show, The Washington Post, vol.4, 2013. ,
The NSA's secret role in the US assassination program. The intercept, vol.10, 2014. ,
Pixel perfect: Fingerprinting canvas in HTML5, Proceedings of W2SP, pp.1-12, 2012. ,
How unique is your web browser?, International Symposium on Privacy Enhancing Technologies Symposium, pp.1-18, 2010. ,
Wi-Fi tracking: Fingerprinting attacks and counter-measures, 2017. ,
URL : https://hal.archives-ouvertes.fr/tel-01659783
A survey on human activity recognition using wearable sensors, IEEE communications surveys & tutorials, vol.15, issue.3, pp.1192-1209, 2012. ,
Activity recognition with smartphone sensors, Tsinghua science and technology, vol.19, issue.3, pp.235-249, 2014. ,
Activity recognition on streaming sensor data, Pervasive and mobile computing, vol.10, pp.138-154, 2014. ,
Location privacy in bluetooth, European Workshop on Security in Ad-hoc and Sensor Networks, pp.176-188, 2005. ,
WiFiPi: Involuntary tracking of visitors at mass events, 2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and Multimedia Networks"(WoWMoM), pp.1-6, 2013. ,
BLEB: Bluetooth Low Energy Botnet for large scale individual tracking, 2017 1st International Conference on Next Generation Computing Applications (NextComp), pp.115-120, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01816475
Bluetooth tracking of humans in an indoor environment: An application to shopping mall visits, Applied geography, vol.78, pp.55-65, 2017. ,
, The Store Of The Future: 150+ Startups Transforming Brick-And-Mortar Retail In One Infographic, pp.2020-2024, 2017.
Danger Close: Fancy Bear Tracking of Ukrainian Field Artillery Units, pp.2020-2024, 2016. ,
Privacy of London Tube Wifi Tracking, pp.2020-2024, 2017. ,
Urban phenology: Toward a real-time census of the city using Wi-Fi data. Computers, Environment and Urban Systems, vol.64, pp.144-153, 2017. ,
, Android Open Source Project. Privacy: MAC Randomization, 2020.
, , pp.2020-2024
About the security content of iOS 8, pp.2020-2024, 2020. ,
, Raspberry Pi Foundation. Teach, Learn, and Make with Raspberry Pi, pp.2020-2025, 2020.
USB Dongle Adapter Dual Mode Device for Windows 10 8 7 Vista, pp.2020-2025 ,
BlueZ -Official Linux Bluetooth protocol stack, pp.2020-2023, 2020. ,
bluepy -A Bluetooth LE interface for Python, pp.2020-2023, 2014. ,
This Is Not a Post About BLE, Introducing BLEAH, pp.2020-2023, 2017. ,
The Emergence of Bluetooth Low Energy, pp.2020-2023, 2015. ,
Low-power wireless advertising software library for distributed M2M and contextual IoT, IEEE 2nd World Forum on Internet of Things (WF-IoT), pp.597-602, 2015. ,
, Fichier des noms, pp.2020-2023, 2018.
, Fichier des prénoms, pp.2020-2023, 2019.
, , pp.2020-2023, 2018.
, AltBeacon Protocol Specification v1.0, pp.2020-2023, 2015.
Uncovering privacy leakage in ble network traffic of wearable fitness trackers, Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, pp.99-104, 2016. ,
Handbook of methods of applied statistics, vol.2, 1967. ,
Statistics to use: Kolmogorov-Smirnov test, 1996. ,
, Bluetooth Core Specification Supplement v9, Bluetooth Special Interest Group, pp.2020-2023, 2019.
Use Continuity to connect your Mac, iPhone, iPad, iPod touch, and Apple Watch, pp.2020-2023, 2019. ,
, Connected Devices Platform Protocol Version 3
, , pp.2020-2023, 2020.
Google Play services, pp.2020-2025, 2020. ,
Nearby -Connections API, pp.2020-2023, 2018. ,
Connectivity Samples Repository, pp.2020-2023, 2020. ,
Use Nearby to find Chromecast devices, pp.2020-2023, 2020. ,
Wombat: An experimental wi-fi tracking system, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01679007
Active behavioral fingerprinting of wireless devices, Proceedings of the first ACM conference on Wireless network security, pp.56-61, 2008. ,
Near-optimal fingerprinting with constraints, Proceedings on Privacy Enhancing Technologies, vol.2016, pp.470-487, 2016. ,
Secure software updates overview, pp.2020-2026, 2020. ,
BlueTrack -Imperceptible tracking of bluetooth devices, Ubicomp Poster Proceedings, 2004. ,
Modelling Microscopic Pedestrian Mobility using Bluetooth, ICAART (2), pp.270-275, 2012. ,
The use of Bluetooth for analysing spatiotemporal dynamics of human movement at mass events: A case study of the Ghent Festivities, Applied Geography, vol.32, issue.2, pp.208-220, 2012. ,
Bluetooth and Wi-Fi MAC address based crowd data collection and monitoring: benefits, challenges and enhancement, 2013. ,
Anonymity, unlinkability, unobservability, pseudonymity, and identity management-a consolidated proposal for terminology, 2005. ,
PyShark -Python packet parser using wireshark's tshark, pp.2020-2024, 2020. ,
Wireshark -The world's foremost and widely-used network protocol analyzer, pp.2020-2024, 1998. ,
Furious MAC is a project to understand, map, and correlate wireless hardware identifiers, pp.2020-2026, 2020. ,
Changes to Device Identifiers in Android, pp.2020-2024 ,
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting, 2013 IEEE Symposium on Security and Privacy, pp.541-555, 2013. ,
, Bluetooth Market Update, Bluetooth Special Interest Group, pp.2020-2024, 2020.
The BlueSniper 'rifle'. 12th DEFCON, 2004. ,
, , pp.2020-2024, 2004.
, Company Identifiers -Assigned Numbers, Bluetooth Special Interest Group, pp.2020-2024, 2020.
Decomposition of MAC address structure for granular device inference, Proceedings of the 32nd Annual Conference on Computer Security Applications, pp.78-88, 2016. ,
Shopping: Buy on Google | Get good deals from your merchants, pp.2020-2026, 2020. ,
, Online Shopping for Electronics, Apparel, Computers, Books, DVDs & more. 2020, pp.2020-2026
, 16 Bit UUIDs for Members -Assigned Numbers, Bluetooth Special Interest Group, pp.2020-2024, 2020.
, Hearing Aid Audio Support Using Bluetooth LE, pp.2020-2024, 2020.
Open API of Sony SmartBand SWR-10, pp.2020-2024, 2015. ,
Facebook -Log in or sign up, pp.2020-2026, 2020. ,
, , pp.2020-2026, 2020.
, , pp.2020-2026
The leaking battery, Data Privacy Management, and Security Assurance, pp.254-263 ,
, , 2015.
Models -The iPhone Wiki, pp.2020-2024, 2020. ,
Identify your MacBook Pro model, pp.2020-2024, 2019. ,
, USB Implementers Forum. Membership Lookup & List. 2020, pp.2020-2024
, Apple. Apple Notification Center Service, pp.2020-2024, 2014.
MiBand2 -Library to work with Xiaomi MiBand 2, pp.2020-2024, 2020. ,
Discovering the Bluetooth UAP, pp.2020-2024, 2014. ,
Detection of abrupt changes: theory and application, vol.104, 1993. ,
URL : https://hal.archives-ouvertes.fr/hal-00008518
pandas -Python Data Analysis Library, pp.2020-2024, 2020. ,
l2ping.c -BlueZ -Bluetooth protocol stack for Linux, pp.2020-2026, 2012. ,
, , pp.2020-2025, 2020.
E-cigarette is better with Bluetooth, pp.2020-2026, 2019. ,
, Bluetooth Special Interest Group. Specifications -Assigned Numbers, pp.2020-2024, 2020.
Download Firefox -Free Web Browser, pp.2020-2026, 2020. ,
All your devices. One seamless experience, pp.2020-2024, 2020. ,
, , pp.2020-2024
Home accessories. The list keeps getting smarter, pp.2020-2024, 2020. ,
Apple Reports Record First Quarter Results, pp.2020-2024, 2020. ,
Linking wireless devices using information contained in Wi-Fi probe requests, Pervasive and Mobile Computing, vol.11, pp.56-69, 2014. ,
Apple Platform Security, pp.2020-2024, 2020. ,
HomeKit Accessory Protocol Specification (Non-Commercial Version) -Release R2, pp.2020-2024, 2019. ,
hcitool.c -BlueZ -Bluetooth protocol stack for Linux, pp.2020-2024, 2012. ,
, , pp.2020-2024, 2020.
Hopper v4 -The macOS and Linux Disassembler, pp.2020-2024, 2020. ,
AirDrop security, pp.2020-2024, 2020. ,
, , pp.2020-2024, 2020.
, , pp.2020-2024
When firmware modifications attack: A case study of embedded exploitation, 2013. ,
Connect and use your AirPods and AirPods Pro, pp.2020-2024, 2020. ,
Dynamic approaches to thwart adversary intelligence gathering, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, vol.1, pp.176-185, 2001. ,
, , pp.2020-2024, 2020.
Use Handoff to continue a task on your other devices, pp.2020-2024, 2019. ,
Instant Hotspot, pp.2020-2024, 2020. ,
Use Instant Hotspot to connect to your Personal Hotspot without entering a password, pp.2020-2024, 2019. ,
An exploration into activityinformed physical advertising using PEST, International Conference on Pervasive Computing, pp.73-90, 2007. ,
Is anybody home? Inferring activity from smart home network traffic, 2016 IEEE Security and Privacy Workshops (SPW), pp.245-251, 2016. ,
The science of guessing: analyzing an anonymized corpus of 70 million passwords, 2012 IEEE Symposium on Security and Privacy, pp.538-552, 2012. ,
The pitfalls of hashing for privacy, IEEE Communications Surveys & Tutorials, vol.20, issue.1, pp.551-565, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01589210
Hashing of personally identifiable information is not sufficient, 2018. ,
The 773 Million Record "Collection #1" Data Breach, pp.2020-2024, 2019. ,
Google's rocky path to email domination, pp.2020-2024, 2019. ,
, PETS. Symposium Attendance -PoPETs Acceptance Rates. 2020, pp.2020-2024
hashcat -Advanced password recovery, pp.2020-2024, 2020. ,
, Autorité de Régulation des Communications Electroniques et des Postes. Marché des communications électroniques en France, pp.2020-2024, 2019.
A Highly Robust Audio Fingerprinting System, Ismir, vol.2002, pp.107-115, 2002. ,
Privacy-enhanced perceptual hashing of audio data, 2013 International Conference on Security and Cryptography (SECRYPT), pp.1-6, 2013. ,
Festvox: Tools for creation and analyses of large speech corpora, Workshop on Very Large Scale Phonetics Research, p.70, 2011. ,
Siri commands -Endless functions of your virtual assistant, pp.2020-2024, 2020. ,
Effective social graph deanonymization based on graph structure and descriptive information, ACM Transactions on Intelligent Systems and Technology (TIST), vol.6, issue.4, pp.1-29, 2015. ,
Things You Should Know About Bluetooth Range ,
Investigating People's Privacy Risk Perception, Proceedings on Privacy Enhancing Technologies, vol.2019, pp.267-288, 2019. ,
On the reliability of wireless fingerprinting using clock skews, Proceedings of the third ACM conference on Wireless network security, pp.169-174, 2010. ,
Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android, Proceedings of the Network and Distributed System Security Symposium (NDSS), 2019. ,
A billion open interfaces for Eve and Mallory: MitM, DoS, and tracking attacks on iOS and macOS through Apple Wireless Direct Link, 28th USENIX Security Symposium (USENIX Security 19), pp.37-54, 2019. ,
Privacy-Preserving t-Incidence for WiFi-based Mobility Analytics, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01376798
Eun-Jeong Shin -Privacy Engineer of Google, pp.2020-2026, 2020. ,
, , pp.2020-2026, 2020.
IoT & Privacy -Comment assurer la confidentialité sur les réseaux sans fil ? L'exemple du BLE, 2020. ,
Télécommunications -Sécurité et vie privée, pp.2020-2025, 2020. ,
An Apple Continuity Protocol Reverse Engineering Project, pp.2020-2026, 2020. ,
Reverse Engineering Apple's BLE Continuity Protocol for Tracking, OS Fingerprinting, and Behavioral Profiling, ShmooCon XVI, 2020. ,
StopCovid : questions sur un mouchard de poche ,
, François Tonic. Programmez! podcast 17 : tracking et Covid19. 2020, pp.2020-2025
Bluetooth : Continuité n'est pas assez étanche avec l'échange de données, 2019. ,
Continuity d'Apple : une fuite du Bluetooth permet de récupérer vos informations, pp.2020-2025, 2019. ,
Des chercheurs français découvrent des fuites d'informations sensibles sur les appareils Apple, pp.2020-2025, 2020. ,
Connexions Apple : un étudiant de l'Insa Lyon détecte des failles, 2020. ,
, , pp.2020-2025
, Commission Nationale de l'Informatique et des Libertés. LINC -Laboratoire d'Innovation Numérique de la CNIL, pp.2020-2025, 2020.
, Cancel my event with Mark.; Decrease brightness.; FaceTime Audio call to Alice.; Find number of dad.; How are the markets doing ?; How big is the biggest elephant ?; How far away is Mars ?; How far away is Tokyo ?.; How humid is it in Paris ?; How long do cats live ?; How many calories in an apple ?; How many days until Christmas ?; How many teeth does a cat have ?; How old is Madonna ?; How old is Peter ?; How tall is Paris Hilton ?; Increase brightness.; Inform my husband when I'm back home.; Inform my wife when I leave my home.; Is mom at home ?; Learn to pronounce my name.; Listen to Alicia Keys.; Locate my father.; Note: 'Susan will be late tonight'.; Open Instagram.; Open Spotify.; Play some music.; Play the rest of this album.; Read my new messages.; Remind me today: call Kevin.; Search Google for pictures of Thor.; Search the web for 'computer'.; Search the web for 'privacy'.; Send a message to Bob.; Send a message to Mark.; Send an e-mail to Susan.; Set a timer for 3 minutes.; Show all my photos.; Show me best family movies.; Show me my notes.; Show me my photos from London.; Show me my photos of last week.; Show me new e-mail from Peter.; Show me the latest tweets.; Show me the nearest cinema.; Show me tweets from Peter.; Show me videos of Avengers.; Show my favorite photos.; Show my selfies.; Square root of 49 ?, Activate Do Not Disturb
, Any new e-mail from Kevin ?; Call Abraham on speakerphone.; Call me a cab.; Call me king.; Cancel my event with Alice.; Compare Nikkei with Dow.; Deactivate Do Not Disturb.; Delete all alarms.; Delete the reminder 'project'.; Find some movie theaters near my home.; Flip a coin.; How many bones does a dog have ?; How many days until the birthday of dad ?, Andrew is my boyfriend
, Open Facebook.; Open mail.; Open settings.; Pause the timer.; Play me my latest voicemail.; Play the Titanic soundtrack.; Play the trailer for 'Pearl Harbor'.; Play this song from the beginning.; Play top 10 songs from Aya Nakamura.; Read Calendar.; Runtime of Titanic ?; Search Wikipedia for 'dog'.; Show me my photos from Lisbon.; Show me my photos of yesterday.; Show me pictures of Hulk.; Show me the appointments for next month.; Show me the traffic.; Tell me a story.; Text Susan: 'I will be late'; Translate 'cat' from English in Russian.; Turn on Cellular Data.; What is the time at home ?; What's the current dew point ?; What's the Nasdaq price ?; What's the pressure outside ?; What's the visibility outside ?; When died Freddie Mercury ?
, Mots-clés : Vie privée; Réseaux sans fil
, Traçage physique; Inférence d'informations utilisateurs; Bluetooth; BLE
,
,
,
, Vincent NICOMETTE (nicomett@insa-toulouse.fr)
,
,
,