Securing the Invisible Thread: A Comprehensive Analysis of BLE Tracker Security in Apple AirTags and Samsung SmartTags.
Hosam AlamlehMichael GogartyDavid RuddellAli Abdullah S. AlQahtaniPublished in: CoRR (2024)
Keyphrases
- comprehensive analysis
- information security
- security issues
- identity management
- multimedia content analysis
- information assurance
- security requirements
- access control
- intrusion detection
- network security
- computer security
- security mechanisms
- security problems
- security systems
- real time
- data security
- visual tracking
- particle filter
- security properties
- challenging sequences
- multiple hypothesis
- sensitive data
- statistical databases
- security policies
- object tracking
- operating system
- image sequences
- robust tracking
- security protocols
- security level
- smart card
- appearance model
- mean shift
- automatic initialization
- data mining