Feel free to browse our academic publications and technical reports.

  • Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert. PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop. 30th USENIX Security Symposium (USENIX Security ’21), August 11–13, 2021, Virtual Event. Website Preprint
  • Milan Stute, Alexander Heinrich, Jannik Lorenz, and Matthias Hollick. Disrupting Continuity of Apple’s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi. 30th USENIX Security Symposium (USENIX Security ’21), August 11–13, 2021, Virtual Event. Website Preprint
  • Alexander Heinrich, Milan Stute, Tim Kornhuber, Matthias Hollick. Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System. Proceedings on Privacy Enhancing Technologies (PoPETs), July 12–16, 2021, Virtual Event. doi:10.2478/popets-2021-0045 Paper Preprint
  • Alexander Heinrich, Milan Stute, and Matthias Hollick. DEMO: OpenHaystack: A Framework for Tracking Personal Bluetooth Devices via Apple’s Massive Find My Network. 14th ACM Conference on Security and Privacy in Wireless and Mobile (WiSec ’21), June 28–July 2, 2021, Virtual Event. Best Demo Award. doi:10.1145/3448300.3468251 PDF Teaser
  • Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert. DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop. 14th ACM Conference on Security and Privacy in Wireless and Mobile (WiSec ’21), June 28–July 2, 2021, Virtual Event. doi:10.1145/3448300.3468252 PDF Teaser
  • Alexander Heinrich, Milan Stute, and Matthias Hollick. DEMO: BTLEmap: Nmap for Bluetooth Low Energy. 13th ACM Conference on Security and Privacy in Wireless and Mobile (WiSec ’20), July 8–10, 2020, Virtual Event. Best Demo Award. doi:10.1145/3395351.3401796 Website PDF Talk
  • Milan Stute. Availability by Design: Practical Denial-of-Service-Resilient Distributed Wireless Networks. Dissertation, Technical University of Darmstadt, February 14, 2020. doi:10.25534/tuprints-00011457 PDF
  • Milan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, and Matthias Hollick. A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link. 28th USENIX Security Symposium (USENIX Security ’19), August 14–16, 2019, Santa Clara, CA, USA. Website PDF Talk
  • Milan Stute, David Kreitschmann, and Matthias Hollick. Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol. GetMobile: Mobile Computing and Communications, 23(1), March 2019. ACM. doi:10.1145/3351422.3351432
  • Milan Stute, David Kreitschmann, and Matthias Hollick. One Billion Apples’ Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol. The 24th Annual International Conference on Mobile Computing and Networking (MobiCom ’18), October 29–November 2, 2018, New Delhi, India. ACM. Best Community Paper Award. doi:10.1145/3241539.3241566 PDF Teaser Talk
  • Milan Stute, David Kreitschmann, and Matthias Hollick. Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link. The 24th Annual International Conference on Mobile Computing and Networking (MobiCom ’18), October 29–November 2, 2018, New Delhi, India. ACM. Best Demo Award. doi:10.1145/3241539.3267716 PDF
  • David Kreitschmann. User Manual for the Apple CoreCapture Framework. arXiv:1808.07353, 2018. PDF

So far, our work resulted in the disclosure of the following security vulnerabilities (CVE entries):

If our project helps you to produce a publication which includes a bibliography, we appreciate it if you cite this project and the relevant papers. Find all references in our bibtex file. Here is the reference for the project only:

@electronic{owl:project,
	author = {Stute, Milan and Kreitschmann, David and Hollick, Matthias},
	title = {The Open Wireless Link Project},
	url = {https://owlink.org},
	year = {2018},
}