Apple controls one of the largest mobile ecosystems, with 1.5 billion active devices worldwide, and offers twelve proprietary wireless Continuity services. Previous works have unveiled several security and privacy issues in the involved protocols. These works extensively studied AirDrop while the coverage of the remaining vast Continuity service space is still low. To facilitate the cumbersome reverse-engineering process, we describe the first guide on how to approach a structured analysis of the involved protocols using several vantage points available on macOS. Also, we develop a toolkit to automate parts of this otherwise manual process. Based on this guide, we analyze the full protocol stacks involved in three Continuity services, in pa...
International audienceThis work is about wireless communications technologies embedded in portable d...
Medium access control (MAC) protocol security is important in wireless networks due to the lack of p...
While Apple iOS has gained increasing attention from attackers due to its rising popularity, very fe...
Apple controls one of the largest mobile ecosystems, with 1.5 billion active devices worldwide, and ...
Apple Wireless Direct Link (AWDL) is a key protocol in Apple's ecosystem used by over one billion iO...
Apple Wireless Direct Link (AWDL) is a key protocol in Apple's ecosystem used by over one billion iO...
Distributed wireless networks (DWNs) where devices communicate directly without relying on Internet ...
Apple Continuity protocols are the underlying network component of Apple Continuity services which a...
With the popularity of today's usability-oriented designs, dubbed Zero Configuration or ZeroCon...
Apple Wireless Direct Link (AWDL) is a proprietary and undocumented IEEE 802.11-based ad hoc protoco...
Bluetooth Low Energy (BLE) devices use public (non-encrypted) advertising channels to announce their...
International audienceThis work is about wireless communications technologies embedded in portable d...
Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Inter...
Apple’s file-sharing service AirDrop leaks phone numbers and email addresses by exchanging vulnerabl...
International audienceThis work is about wireless communications technologies embedded in portable d...
Medium access control (MAC) protocol security is important in wireless networks due to the lack of p...
While Apple iOS has gained increasing attention from attackers due to its rising popularity, very fe...
Apple controls one of the largest mobile ecosystems, with 1.5 billion active devices worldwide, and ...
Apple Wireless Direct Link (AWDL) is a key protocol in Apple's ecosystem used by over one billion iO...
Apple Wireless Direct Link (AWDL) is a key protocol in Apple's ecosystem used by over one billion iO...
Distributed wireless networks (DWNs) where devices communicate directly without relying on Internet ...
Apple Continuity protocols are the underlying network component of Apple Continuity services which a...
With the popularity of today's usability-oriented designs, dubbed Zero Configuration or ZeroCon...
Apple Wireless Direct Link (AWDL) is a proprietary and undocumented IEEE 802.11-based ad hoc protoco...
Bluetooth Low Energy (BLE) devices use public (non-encrypted) advertising channels to announce their...
International audienceThis work is about wireless communications technologies embedded in portable d...
Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Inter...
Apple’s file-sharing service AirDrop leaks phone numbers and email addresses by exchanging vulnerabl...
International audienceThis work is about wireless communications technologies embedded in portable d...
Medium access control (MAC) protocol security is important in wireless networks due to the lack of p...
While Apple iOS has gained increasing attention from attackers due to its rising popularity, very fe...