Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2022
DOI: 10.1145/3507657.3528551
|View full text |Cite
|
Sign up to set email alerts
|

An Investigative Study on the Privacy Implications of Mobile E-scooter Rental Apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 47 publications
0
2
0
Order By: Relevance
“…Despite their associated security, privacy, and safety risks, no research work evaluated the security protocols used by Xiaomi to secure the interaction between its e-scooters and Mi Home. Instead, recent work focused on the privacy implications of e-scooter rental apps (including Xiaomi) [46] and on the security of Xiaomi's fitness tracking ecosystem [10]. In our work, we find that Xiaomi protocols can be exploited to (remotely) unlock and steal an e-scooter or permanently prevent its owner to manage it from Mi Home.…”
Section: Introductionmentioning
confidence: 81%
See 1 more Smart Citation
“…Despite their associated security, privacy, and safety risks, no research work evaluated the security protocols used by Xiaomi to secure the interaction between its e-scooters and Mi Home. Instead, recent work focused on the privacy implications of e-scooter rental apps (including Xiaomi) [46] and on the security of Xiaomi's fitness tracking ecosystem [10]. In our work, we find that Xiaomi protocols can be exploited to (remotely) unlock and steal an e-scooter or permanently prevent its owner to manage it from Mi Home.…”
Section: Introductionmentioning
confidence: 81%
“…Public e-scooters from the Lime sharing company are weak to a man-in-the-middle attack that allows for arbitrarily swapping audio files [26]. N. Vinayaga-Sureshkanth et al [46] provide an extended evaluation of Android e-scooter rental applications. In particular, they investigate the user-related data collected and shared with third parties, which could monitor the users' schedules and visited locations.…”
Section: Related Workmentioning
confidence: 99%