2022 IEEE Security and Privacy Workshops (SPW) 2022
DOI: 10.1109/spw54247.2022.9833881
|View full text |Cite
|
Sign up to set email alerts
|

AirTag of the Clones: Shenanigans with Liberated Item Finders

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…The AirTags emit a beacon message constantly, which is picked up by the nearby iPhones, Macs, or other Apple devices. This allows the Apple Cloud to obtain the AirTag's exact location in the centimeter range [30,31].…”
Section: Crowd Monitoring Systemmentioning
confidence: 99%
“…The AirTags emit a beacon message constantly, which is picked up by the nearby iPhones, Macs, or other Apple devices. This allows the Apple Cloud to obtain the AirTag's exact location in the centimeter range [30,31].…”
Section: Crowd Monitoring Systemmentioning
confidence: 99%
“…With regard to commercial devices, Roth et al [25] analyse the hardware and firmware used in Apple's AirTags. Mayberry et al [26] study some malicious tracker techniques that have been used to track persons and propose several protection mechanisms.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…Since Apple has not publicly released technical specifications for Find My enabled devices or the Find My protocol, there is a great deal of prior work solving this problem by reverse engineering the protocol [16], extracting and analyzing the AirTag firmware [22,25], and constructing tools to detect and analyze Find My traffic [14,20]. Researchers have also studied ISAs [21] specifically, analyzing when they are produced and how they can be circumvented.…”
Section: Background and Related Work 21 Prior Workmentioning
confidence: 99%