Skip to main content

Showing 1–7 of 7 results for author: Stute, M

Searching in archive cs. Search in all archives.
.
  1. Network Message Field Type Classification and Recognition for Unknown Binary Protocols

    Authors: Stephan Kleber, Milan Stute, Matthias Hollick, Frank Kargl

    Abstract: Reverse engineering of unknown network protocols based on recorded traffic traces enables security analyses and debugging of undocumented network services. In particular for binary protocols, existing approaches (1) lack comprehensive methods to classify or determine the data type of a discovered segment in a message, e.,g., a number, timestamp, or network address, that would allow for a semantic… ▽ More

    Submitted 7 November, 2022; originally announced January 2023.

    Journal ref: Proceedings of the DSN Workshop on Data-Centric Dependability and Security. DCDS 2022. Baltimore, Maryland, USA

  2. arXiv:2103.02282  [pdf, other

    cs.CR cs.NI

    Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System

    Authors: Alexander Heinrich, Milan Stute, Tim Kornhuber, Matthias Hollick

    Abstract: Overnight, Apple has turned its hundreds-of-million-device ecosystem into the world's largest crowd-sourced location tracking network called offline finding (OF). OF leverages online finder devices to detect the presence of missing offline devices using Bluetooth and report an approximate location back to the owner via the Internet. While OF is not the first system of its kind, it is the first to… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

    Comments: Accepted at Privacy Enhancing Technologies Symposium (PETS) 2021

  3. DEMO: BTLEmap: Nmap for Bluetooth Low Energy

    Authors: Alexander Heinrich, Milan Stute, Matthias Hollick

    Abstract: The market for Bluetooth Low Energy devices is booming and, at the same time, has become an attractive target for adversaries. To improve BLE security at large, we present BTLEmap, an auditing application for BLE environments. BTLEmap is inspired by network discovery and security auditing tools such as Nmap for IP-based networks. It allows for device enumeration, GATT service discovery, and device… ▽ More

    Submitted 1 July, 2020; originally announced July 2020.

    Comments: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks

  4. Empirical Insights for Designing Information and Communication Technology for International Disaster Response

    Authors: Milan Stute, Max Maass, Tom Schons, Marc-André Kaufhold, Christian Reuter, Matthias Hollick

    Abstract: Due to the increase in natural disasters in the past years, Disaster Response Organizations (DROs) are faced with the challenge of co** with more and larger operations. Currently appointed Information and Communications Technology (ICT) used for coordination and communication is sometimes outdated and does not scale, while novel technologies have the potential to greatly improve disaster respons… ▽ More

    Submitted 11 May, 2020; originally announced May 2020.

    Journal ref: International Journal of Disaster Risk Reduction, Volume 47, August 2020, 101598

  5. Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link

    Authors: Milan Stute, David Kreitschmann, Matthias Hollick

    Abstract: Apple Wireless Direct Link (AWDL) is a proprietary and undocumented wireless ad hoc protocol that Apple introduced around 2014 and which is the base for applications such as AirDrop and AirPlay. We have reverse engineered the protocol and explain its frame format and operation in our MobiCom '18 paper "One Billion Apples' Secret Sauce: Recipe of the Apple Wireless Direct Link Ad hoc Protocol." AWD… ▽ More

    Submitted 17 December, 2018; originally announced December 2018.

    Comments: The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18)

  6. One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol

    Authors: Milan Stute, David Kreitschmann, Matthias Hollick

    Abstract: Apple Wireless Direct Link (AWDL) is a proprietary and undocumented IEEE 802.11-based ad hoc protocol. Apple first introduced AWDL around 2014 and has since integrated it into its entire product line, including iPhone and Mac. While we have found that AWDL drives popular applications such as AirPlay and AirDrop on more than one billion end-user devices, neither the protocol itself nor potential se… ▽ More

    Submitted 9 August, 2018; originally announced August 2018.

    Comments: The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18)

  7. Reverse Engineering Human Mobility in Large-scale Natural Disasters

    Authors: Milan Stute, Max Maass, Tom Schons, Matthias Hollick

    Abstract: Delay/Disruption-Tolerant Networks (DTNs) have been around for more than a decade and have especially been proposed to be used in scenarios where communication infrastructure is unavailable. In such scenarios, DTNs can offer a best-effort communication service by exploiting user mobility. Natural disasters are an important application scenario for DTNs when the cellular network is destroyed by nat… ▽ More

    Submitted 21 September, 2017; v1 submitted 7 August, 2017; originally announced August 2017.

    Comments: To appear in Proceedings of MSWiM '17. 8 Pages, 9 Figures. Source code and data available at https://github.com/seemoo-lab/natural-disaster-mobility