Xiaomi is the leading company in the fitness tracking industry. Successful attacks on its fitness tracking ecosystem would result in severe consequences, including the loss of sensitive health and personal data. Despite these relevant risks, we know very little about the security mechanisms adopted by Xiaomi. In this work, we uncover them and show that they are insecure. In particular, Xiaomi protects its fitness tracking ecosystem with custom application-layer protocols spoken over insecure Bluetooth Low-Energy (BLE) connections (ignoring standard BLE security mechanisms already supported by their devices) and TLS connections. We identify severe vulnerabilities affecting such proprietary protocols, including unilateral and replayable authe...
Mobile and smart devices (ranging from popular smartphones and tablets to wearable fitness trackers ...
Mobile devices, such as smartphones and tablets, have a critical role in our everyday life. We use o...
Firmware vulnerability is an important target for IoT attacks, but it is challenging, because firmwa...
Xiaomi is the leading company in the fitness tracking industry. Successful attacks on its fitness tr...
Fitbit fitness trackers record sensitive personal information, including daily step counts, heart ra...
Funding: This work has been co-funded by the DFG as part of projects S1 within the CRC 1119 CROSSING...
Tens of millions of wearable fitness trackers are shipped yearly to consumers who routinely collect ...
Tens of millions of wearable fitness trackers are shipped yearly to consumers who routinely collect ...
Funding: Hossein Fereidooni is supported by the Deutsche Akademische Austauschdienst (DAAD). Mauro C...
Abstract—Wearable personal fitness trackers automatically collect sensor data about the user through...
Abstract—A fundamental security principle in developing net-worked applications is end-to-end securi...
The wearable industry has experienced a notable growth over the last decade, especially in fitness o...
The popularity of wearable devices is growing exponentially, with consumers using these for a variet...
The research was designed to study IoT security vulnerabilities and how to better protect IoT commun...
In this paper we describe a cyberattack against 2 well-known wearable devices. The attacker presente...
Mobile and smart devices (ranging from popular smartphones and tablets to wearable fitness trackers ...
Mobile devices, such as smartphones and tablets, have a critical role in our everyday life. We use o...
Firmware vulnerability is an important target for IoT attacks, but it is challenging, because firmwa...
Xiaomi is the leading company in the fitness tracking industry. Successful attacks on its fitness tr...
Fitbit fitness trackers record sensitive personal information, including daily step counts, heart ra...
Funding: This work has been co-funded by the DFG as part of projects S1 within the CRC 1119 CROSSING...
Tens of millions of wearable fitness trackers are shipped yearly to consumers who routinely collect ...
Tens of millions of wearable fitness trackers are shipped yearly to consumers who routinely collect ...
Funding: Hossein Fereidooni is supported by the Deutsche Akademische Austauschdienst (DAAD). Mauro C...
Abstract—Wearable personal fitness trackers automatically collect sensor data about the user through...
Abstract—A fundamental security principle in developing net-worked applications is end-to-end securi...
The wearable industry has experienced a notable growth over the last decade, especially in fitness o...
The popularity of wearable devices is growing exponentially, with consumers using these for a variet...
The research was designed to study IoT security vulnerabilities and how to better protect IoT commun...
In this paper we describe a cyberattack against 2 well-known wearable devices. The attacker presente...
Mobile and smart devices (ranging from popular smartphones and tablets to wearable fitness trackers ...
Mobile devices, such as smartphones and tablets, have a critical role in our everyday life. We use o...
Firmware vulnerability is an important target for IoT attacks, but it is challenging, because firmwa...