Главная
Study mode:
on
1
Introduction
2
Privacy risk
3
Hardware imperfections
4
Optimization approach
5
Challenges
6
Logistics
7
Field Experiments
8
Tracking of a Person
9
Conclusion
Description:
Explore the vulnerabilities of Bluetooth Low Energy (BLE) location tracking in mobile devices through this 22-minute IEEE conference talk. Delve into privacy risks, hardware imperfections, and optimization approaches for physical-layer attacks. Learn about the challenges and logistics involved in conducting field experiments, including tracking a person. Gain insights from researchers at UC San Diego as they evaluate and discuss the implications of these security concerns for mobile device users.

Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices

IEEE
Add to list
0:00 / 0:00