{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:00:19Z","timestamp":1725613219292},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","funder":[{"name":"German Federal Ministry of Education and Research"},{"name":"Deutsche Forschungsgemeinschaft (DFG)"},{"name":"LOEWE initiative (Hesse, Germany)"},{"name":"European Research Council (ERC)","award":["850990"]},{"name":"Hessian State Ministry for Higher Education, Research and the Arts within ATHENE"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1145\/3448300.3468252","type":"proceedings-article","created":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T14:57:40Z","timestamp":1624546660000},"page":"371-373","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["AirCollect"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Heinrich","sequence":"first","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Thomas","family":"Schneider","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Milan","family":"Stute","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Christian","family":"Weinert","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,6,28]]},"reference":[{"volume-title":"Apple Bleee: Everyone Knows What Happens on Your iPhone","year":"2019","author":"Chastuhin Dmitry","key":"e_1_3_2_1_1_1","unstructured":"Dmitry Chastuhin . Apple Bleee: Everyone Knows What Happens on Your iPhone . July 25, 2019 . url: https:\/\/hexway.io\/research\/apple-bleee\/ (visited on 10\/15\/2020). Dmitry Chastuhin. Apple Bleee: Everyone Knows What Happens on Your iPhone. July 25, 2019. url: https:\/\/hexway.io\/research\/apple-bleee\/ (visited on 10\/15\/2020)."},{"volume-title":"Recover Encrypted Email Addresses","year":"2020","key":"e_1_3_2_1_2_1","unstructured":"Datafinder. Recover Encrypted Email Addresses . 2020 . url: https:\/\/web.archive.org\/web\/20191211152224\/https:\/\/datafinder.com\/products\/email-recovery (visited on 10\/15\/2020). Datafinder. Recover Encrypted Email Addresses. 2020. url: https:\/\/web.archive.org\/web\/20191211152224\/https:\/\/datafinder.com\/products\/email-recovery (visited on 10\/15\/2020)."},{"key":"e_1_3_2_1_3_1","unstructured":"Christoph Hagen and Sebastian Schindler. RainbowPhones. 2021. url: https:\/\/github.com\/contact-discovery\/rt_phone_numbers. Christoph Hagen and Sebastian Schindler. RainbowPhones. 2021. url: https:\/\/github.com\/contact-discovery\/rt_phone_numbers."},{"volume-title":"Large-scale Abuse of Contact Discovery in Mobile Messengers","year":"2021","author":"Hagen Christoph","key":"e_1_3_2_1_4_1","unstructured":"Christoph Hagen , Christian Weinert , Christoph Sendner , Alexandra Dmitrienko , and Thomas Schneider . \" All the Numbers are US : Large-scale Abuse of Contact Discovery in Mobile Messengers \". In : NDSS. 2021 . url: https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/ndss2021_1C-3_23159_paper.pdf. Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, and Thomas Schneider. \"All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers\". In: NDSS. 2021. url: https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/ndss2021_1C-3_23159_paper.pdf."},{"volume-title":"USENIX Security Symposium.","year":"2021","author":"Heinrich Alexander","key":"e_1_3_2_1_5_1","unstructured":"Alexander Heinrich , Matthias Hollick , Thomas Schneider , Milan Stute , and Christian Weinert . \"PrivateDrop : Practical Privacy-Preserving Authentication for Apple AirDrop \". In: USENIX Security Symposium. 2021 . url: https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/heinrich. Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, and Christian Weinert. \"PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop\". In: USENIX Security Symposium. 2021. url: https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/heinrich."},{"volume-title":"Extracting Apple ID Validation Record, Certificate, and Key for AirDrop","year":"2020","author":"Stute Milan","key":"e_1_3_2_1_6_1","unstructured":"Milan Stute . Extracting Apple ID Validation Record, Certificate, and Key for AirDrop . 2020 . url: https:\/\/github.com\/seemoo-lab\/airdrop-keychain-extractor. Milan Stute. Extracting Apple ID Validation Record, Certificate, and Key for AirDrop. 2020. url: https:\/\/github.com\/seemoo-lab\/airdrop-keychain-extractor."},{"volume-title":"OpenDrop: An Open Source AirDrop Implementation","year":"2019","author":"Stute Milan","key":"e_1_3_2_1_7_1","unstructured":"Milan Stute and Alexander Heinrich . OpenDrop: An Open Source AirDrop Implementation . 2019 . url: https:\/\/github.com\/seemoo-lab\/opendrop. Milan Stute and Alexander Heinrich. OpenDrop: An Open Source AirDrop Implementation. 2019. url: https:\/\/github.com\/seemoo-lab\/opendrop."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241566"},{"volume-title":"USENIX Security Symposium.","year":"2019","author":"Stute Milan","key":"e_1_3_2_1_9_1","unstructured":"Milan Stute , Sashank Narain , Alex Mariotto , Alexander Heinrich , David Kreitschmann , Guevara Noubir , and Matthias Hollick . \" A Billion Open Interfaces for Eve and Mallory : MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link \". In: USENIX Security Symposium. 2019 . url: https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/stute. Milan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, and Matthias Hollick. \"A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link\". In: USENIX Security Symposium. 2019. url: https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/stute."}],"event":{"name":"WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Abu Dhabi United Arab Emirates","acronym":"WiSec '21"},"container-title":["Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448300.3468252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T17:38:57Z","timestamp":1672940337000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448300.3468252"}},"subtitle":["efficiently recovering hashed phone numbers leaked via Apple AirDrop"],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":9,"alternative-id":["10.1145\/3448300.3468252","10.1145\/3448300"],"URL":"http:\/\/dx.doi.org\/10.1145\/3448300.3468252","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]},"assertion":[{"value":"2021-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}