Xiaomi is the leading company in the fitness tracking industry. Successful attacks on its fitness tracking ecosystem would result in severe consequences, including the loss of sensitive health and personal data. Despite these relevant risks, we know very little about the security mechanisms adopted by Xiaomi. In this work, we uncover them and show that they are insecure. In particular, Xiaomi protects its fitness tracking ecosystem with custom application-layer protocols spoken over insecure Bluetooth Low-Energy (BLE) connections (ignoring standard BLE security mechanisms already supported by their devices) and TLS connections. We identify severe vulnerabilities affecting such proprietary protocols, including unilateral and replayable authe...
The use of wearable devices for fitness and health tracking is on an upward curve with a range of de...
Apple controls one of the largest mobile ecosystems, with 1.5 billion active devices worldwide, and ...
In this paper we describe a cyberattack against 2 well-known wearable devices. The attacker presente...
Xiaomi is the leading company in the fitness tracking industry. Successful attacks on its fitness tr...
Fitbit fitness trackers record sensitive personal information, including daily step counts, heart ra...
Funding: This work has been co-funded by the DFG as part of projects S1 within the CRC 1119 CROSSING...
Tens of millions of wearable fitness trackers are shipped yearly to consumers who routinely collect ...
Tens of millions of wearable fitness trackers are shipped yearly to consumers who routinely collect ...
Funding: Hossein Fereidooni is supported by the Deutsche Akademische Austauschdienst (DAAD). Mauro C...
Mobile and smart devices (ranging from popular smartphones and tablets to wearable fitness trackers ...
The research was designed to study IoT security vulnerabilities and how to better protect IoT commun...
Abstract—Wearable personal fitness trackers automatically collect sensor data about the user through...
Abstract—A fundamental security principle in developing net-worked applications is end-to-end securi...
Bluetooth technology has enabled short-range wireless communication for billions of devices. Bluetoo...
The wearable industry has experienced a notable growth over the last decade, especially in fitness o...
The use of wearable devices for fitness and health tracking is on an upward curve with a range of de...
Apple controls one of the largest mobile ecosystems, with 1.5 billion active devices worldwide, and ...
In this paper we describe a cyberattack against 2 well-known wearable devices. The attacker presente...
Xiaomi is the leading company in the fitness tracking industry. Successful attacks on its fitness tr...
Fitbit fitness trackers record sensitive personal information, including daily step counts, heart ra...
Funding: This work has been co-funded by the DFG as part of projects S1 within the CRC 1119 CROSSING...
Tens of millions of wearable fitness trackers are shipped yearly to consumers who routinely collect ...
Tens of millions of wearable fitness trackers are shipped yearly to consumers who routinely collect ...
Funding: Hossein Fereidooni is supported by the Deutsche Akademische Austauschdienst (DAAD). Mauro C...
Mobile and smart devices (ranging from popular smartphones and tablets to wearable fitness trackers ...
The research was designed to study IoT security vulnerabilities and how to better protect IoT commun...
Abstract—Wearable personal fitness trackers automatically collect sensor data about the user through...
Abstract—A fundamental security principle in developing net-worked applications is end-to-end securi...
Bluetooth technology has enabled short-range wireless communication for billions of devices. Bluetoo...
The wearable industry has experienced a notable growth over the last decade, especially in fitness o...
The use of wearable devices for fitness and health tracking is on an upward curve with a range of de...
Apple controls one of the largest mobile ecosystems, with 1.5 billion active devices worldwide, and ...
In this paper we describe a cyberattack against 2 well-known wearable devices. The attacker presente...