ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2105.11172
  4. Cited By
Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices

Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices

24 May 2021
Ludovic Barman
Alexandre Dumur
Apostolos Pyrgelis
Jean-Pierre Hubaux
ArXiv (abs)PDFHTML

Papers citing "Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices"

14 / 14 papers shown
Title
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth
  Escalation Targets
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets
Jan Ruge
J. Classen
Francesco Gringoli
M. Hollick
30
78
0
17 Jun 2020
InternalBlue - Bluetooth Binary Patching and Experimentation Framework
InternalBlue - Bluetooth Binary Patching and Experimentation Framework
Dennis Mantz
J. Classen
Matthias Schulz
M. Hollick
29
53
0
02 May 2019
Handoff All Your Privacy: A Review of Apple's Bluetooth Low Energy
  Continuity Protocol
Handoff All Your Privacy: A Review of Apple's Bluetooth Low Energy Continuity Protocol
Jeremy Martin
Douglas Alpuche
Kristina Bodeman
Lamont Brown
Ellis Fenske
Lucas Foppe
Travis Mayberry
Erik C. Rye
Brandon Sipes
Sam Teplov
29
57
0
24 Apr 2019
Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks
Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks
Mohammad Saidur Rahman
Payap Sirinam
Nate Mathews
K. Gangadhara
M. Wright
38
124
0
18 Feb 2019
Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping
Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping
Noah J. Apthorpe
D. Huang
D. Reisman
Arvind Narayanan
Nick Feamster
55
158
0
03 Dec 2018
Identification of Wearable Devices with Bluetooth
Identification of Wearable Devices with Bluetooth
Hidayet Aksu
S. M. I. A. Selcuk Uluagac
•. E. S. Bentley
32
43
0
27 Sep 2018
Peek-a-Boo: I see your smart home activities, even encrypted!
Peek-a-Boo: I see your smart home activities, even encrypted!
Abbas Acar
Hossein Fereidooni
Tigist Abera
A. Sikder
Markus Miettinen
Hidayet Aksu
Mauro Conti
A. Sadeghi
Selcuk Uluagac
63
269
0
08 Aug 2018
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer
Chong Chen
D. E. Asoni
A. Perrig
David Barrera
G. Danezis
Carmela Troncoso
28
48
0
23 Feb 2018
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with
  Deep Learning
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning
Payap Sirinam
Mohsen Imani
Marc Juárez
M. Wright
68
460
0
07 Jan 2018
Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT
  Traffic
Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic
Noah J. Apthorpe
D. Reisman
S. Sundaresan
Arvind Narayanan
Nick Feamster
45
237
0
16 Aug 2017
Robust Smartphone App Identification Via Encrypted Network Traffic
  Analysis
Robust Smartphone App Identification Via Encrypted Network Traffic Analysis
Vincent F. Taylor
Riccardo Spolaor
Mauro Conti
Ivan Martinovic
53
300
0
20 Apr 2017
Robust Machine Learning for Encrypted Traffic Classification
Robust Machine Learning for Encrypted Traffic Classification
Maor Bahumi
Yehonatan Zion
Jonathan Muehlstein
Ofir Pele
A. Dvir
Ran Dubin
AAML
31
64
0
15 Mar 2016
k-fingerprinting: a Robust Scalable Website Fingerprinting Technique
k-fingerprinting: a Robust Scalable Website Fingerprinting Technique
Jamie Hayes
G. Danezis
53
385
0
02 Sep 2015
Riposte: An Anonymous Messaging System Handling Millions of Users
Riposte: An Anonymous Messaging System Handling Millions of Users
Henry Corrigan-Gibbs
Dan Boneh
David Mazières
60
260
0
20 Mar 2015
1