{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T03:19:11Z","timestamp":1709349551163},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3099017","type":"journal-article","created":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T20:26:23Z","timestamp":1626899183000},"page":"103365-103375","source":"Crossref","is-referenced-by-count":2,"title":["An Advertising Overflow Attack Against Android Exposure Notification System Impacting COVID-19 Contact Tracing Applications"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-7210-6918","authenticated-orcid":false,"given":"Henrique","family":"Faria","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0041-8939","authenticated-orcid":false,"given":"Sara","family":"Paiva","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1856-6101","authenticated-orcid":false,"given":"Pedro","family":"Pinto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","year":"2020","journal-title":"Exposure Notifications API Internals"},{"key":"ref32","author":"young","year":"2020","journal-title":"BLE Advertising Fails"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3411497.3420219"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2020.1803155"},{"key":"ref37","year":"2021","journal-title":"Profile battery usage with batterystats and battery historian"},{"key":"ref36","year":"2021","journal-title":"Android Debug Bridge (Adb)"},{"key":"ref35","year":"2020","journal-title":"Stayaway Covid App"},{"key":"ref34","year":"2021","journal-title":"Advertise Callback Android Developers"},{"key":"ref10","year":"2021","journal-title":"Exposure Notification Api"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.08.011"},{"key":"ref12","year":"2020","journal-title":"Exposure notification Bluetooth specification"},{"key":"ref13","year":"2020","journal-title":"Bluetooth Low Energy Android Open Source Project"},{"key":"ref14","article-title":"An empirical evaluation of Bluetooth-based decentralized contact tracing in crowds","author":"hsiao","year":"2020","journal-title":"arXiv 2011 04322"},{"key":"ref15","article-title":"Contact tracing: An overview of technologies and cyber risks","author":"legendre","year":"2020","journal-title":"arXiv 2007 02806"},{"key":"ref16","article-title":"Component-based comparison of privacy-first exposure notification protocols","author":"daw","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65277-7_1"},{"key":"ref18","first-page":"428","article-title":"Security analysis of the COVID-19 contact tracing specifications by Apple Inc. and Google Inc","volume":"2020","author":"gvili","year":"2020","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref19","first-page":"493","article-title":"Towards defeating mass surveillance and SARS-CoV-2: The pronto-C2 fully decentralized automatic contact tracing system","volume":"2020","author":"avitabile","year":"2020","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref28","first-page":"770","article-title":"Mitigating denial-of-service attacks on digital contact tracing","author":"chen","year":"2020","journal-title":"Proc 18th Conf Embedded Netw Sensor Syst (SenSys)"},{"key":"ref4","article-title":"Quantifying SARS-CoV-2 infection risk within the Google\/ Apple exposure notification framework to inform quarantine recommendations","author":"wilson","year":"2020","journal-title":"medRxiv"},{"key":"ref27","article-title":"Contact tracing by giant data collectors: Opening pandora’s box of threats to privacy, sovereignty and national security","author":"boutet","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cvdhj.2020.09.004"},{"key":"ref6","author":"vaudenay","year":"2020","journal-title":"Analysis of DP3T—Between Scylla and Charybdis"},{"key":"ref29","article-title":"Digital surveillance systems for tracing COVID-19: Privacy and security challenges with recommendations","volume":"abs 2007 13182","author":"hussein","year":"2020","journal-title":"CoRR"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75539-3_18"},{"key":"ref8","first-page":"531","article-title":"Centralized or decentralized? The contact tracing dilemma","volume":"2020","author":"vaudenay","year":"2020","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78372-3_9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2020.09.001"},{"key":"ref9","year":"2021","journal-title":"Mobile Contact Tracing Apps in EU Member States"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2196\/19857"},{"key":"ref20","article-title":"A privacy-preserving solution for proximity tracing avoiding identifier exchanging","author":"buccafurri","year":"2020","journal-title":"arXiv 2005 10309"},{"key":"ref22","article-title":"SwissCovid: A critical analysis of risk assessment by Swiss authorities","author":"dehaye","year":"2020","journal-title":"arXiv 2006 10719"},{"key":"ref21","article-title":"On the privacy and integrity risks of contact-tracing applications","author":"huang","year":"2020","journal-title":"arXiv 2012 03283"},{"key":"ref24","article-title":"Target privacy threat modeling for COVID-19 exposure notification systems","author":"gangavarapu","year":"2020","journal-title":"arXiv 2009 13300"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00069"},{"key":"ref26","author":"farrell","year":"2020","journal-title":"A Coronavirus Contact Tracing App Replay Attack With Estimated Amplification Factors"},{"key":"ref25","author":"gennaro","year":"2020","journal-title":"Exposure Notification System May Allow for Large-Scale Voter Suppression"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09492122.pdf?arnumber=9492122","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:57:09Z","timestamp":1639771029000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9492122\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3099017","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}