2021
DOI: 10.1007/978-3-030-78372-3_9
|View full text |Cite
|
Sign up to set email alerts
|

Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…Actually, there is no evidence of any causality between ticking SwissCovid in this form and being a discovered case. One comment by Dehaye 6 states that people put in quarantine by contact tracers at the time were not In what follows, we write łdiscoveredž under double quotes to remind that the count may be strongly biased (overestimated).…”
Section: Survey-based Performancementioning
confidence: 99%
“…Actually, there is no evidence of any causality between ticking SwissCovid in this form and being a discovered case. One comment by Dehaye 6 states that people put in quarantine by contact tracers at the time were not In what follows, we write łdiscoveredž under double quotes to remind that the count may be strongly biased (overestimated).…”
Section: Survey-based Performancementioning
confidence: 99%
“…Even worse, the GAEN API [3] allows for a twohour time window for A 𝑤 to conduct relay attacks. Recently, various flavors of relay attacks against GAEN were introduced [5], [21], [37], [7], [29], [38], [39] For instance, Baumgärtner et al [5] realized this attack on the German Corona-Warm-App [40] which is based on GAEN. They showed that A 𝑤 can even use off-the-shelf smartphones to capture and relay TempIDs between three different cities in Germany.…”
Section: B Gaenmentioning
confidence: 99%
“…Tracing Forgery: The Terrorist Attack. In this class of attacks (see [7]), the adversary colludes with infected users (who want to monetize their infection status) to obtain their Temporary Exposure Key (TEK). The adversary then replays TempIDs derived from the TEK at the adversary-chosen (targeted) places.…”
Section: B Gaenmentioning
confidence: 99%
See 2 more Smart Citations