The digital contact tracing applications are one of the many initiatives to fight the COVID-19 virus. Some of these Apps use the Exposure Notification (EN) system available on Google and Apple’s operating systems. However, EN-based contact tracing Apps depend on the availability of Bluetooth interfaces to exchange proximity identifiers, which, if compromised, directly impact their effectiveness. This paper discloses and details the Advertising Overflow attack, a novel internal Denial of Service (DoS) attack targeting the EN system on Android devices. The attack is performed by a malicious App that occupies all the Bluetooth advertising slots in an Android device, effectively blocking any advertising attempt of EN or other Apps. The i...
We found that today’s Android design allows an app with a Bluetooth permission to gain unauthorized ...
Contact tracing has been considered a critical strategy and a necessity to combat and contain the Co...
Abstract — As cellular data services and applications are being widely deployed, they become attract...
The digital contact tracing applications are one of the many initiatives to fight the COVID-19 virus...
Smartphones have become ubiquitous and smartphone users are increasingly relying on the mobile appli...
The Bluetooth protocol is used millions of times per day, as a means of short-range wireless communi...
Bluetooth technology has enabled short-range wireless communication for billions of devices. Bluetoo...
The recent pandemic fosters an increasing dependency on various forms of digital communications that...
In connection with the ongoing COVID-19 pandemic, contact tracing mobile applications (e.g., that le...
With the proliferation of mobile and IoT devices, malicious application developers seize the opportu...
Google and Apple have jointly provided an API for exposure notification in order to implement decent...
We describe a novel class of attacks called denial-of-app that allows adversaries to inhibit the fut...
We describe a novel class of attacks called denial-of-app that allows adversaries to inhibit the fut...
Recent years have witnessed significant growth in the mobile device landscape as smartphones and tab...
Digital contact tracing apps allow to alert people who have been in contact with people who may be c...
We found that today’s Android design allows an app with a Bluetooth permission to gain unauthorized ...
Contact tracing has been considered a critical strategy and a necessity to combat and contain the Co...
Abstract — As cellular data services and applications are being widely deployed, they become attract...
The digital contact tracing applications are one of the many initiatives to fight the COVID-19 virus...
Smartphones have become ubiquitous and smartphone users are increasingly relying on the mobile appli...
The Bluetooth protocol is used millions of times per day, as a means of short-range wireless communi...
Bluetooth technology has enabled short-range wireless communication for billions of devices. Bluetoo...
The recent pandemic fosters an increasing dependency on various forms of digital communications that...
In connection with the ongoing COVID-19 pandemic, contact tracing mobile applications (e.g., that le...
With the proliferation of mobile and IoT devices, malicious application developers seize the opportu...
Google and Apple have jointly provided an API for exposure notification in order to implement decent...
We describe a novel class of attacks called denial-of-app that allows adversaries to inhibit the fut...
We describe a novel class of attacks called denial-of-app that allows adversaries to inhibit the fut...
Recent years have witnessed significant growth in the mobile device landscape as smartphones and tab...
Digital contact tracing apps allow to alert people who have been in contact with people who may be c...
We found that today’s Android design allows an app with a Bluetooth permission to gain unauthorized ...
Contact tracing has been considered a critical strategy and a necessity to combat and contain the Co...
Abstract — As cellular data services and applications are being widely deployed, they become attract...