Feel free to browse our academic publications and technical reports.

  • Milan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, and Matthias Hollick. A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link. 28th USENIX Security Symposium (USENIX Security ’19), August 14–16, 2019, Santa Clara, CA, USA. PDF Website

  • Milan Stute, David Kreitschmann, and Matthias Hollick. Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol. GetMobile: Mobile Computing and Communications, 23(1), March 2019. ACM. doi:10.1145/3351422.3351432

  • Milan Stute, David Kreitschmann, and Matthias Hollick. One Billion Apples’ Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol. The 24th Annual International Conference on Mobile Computing and Networking (MobiCom ’18), October 29–November 2, 2018, New Delhi, India. ACM. Best Community Paper Award. doi:10.1145/3241539.3241566 PDF Teaser Talk

  • Milan Stute, David Kreitschmann, and Matthias Hollick. Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link. The 24th Annual International Conference on Mobile Computing and Networking (MobiCom ’18), October 29–November 2, 2018, New Delhi, India. ACM. Best Demo Award. doi:10.1145/3241539.3267716 PDF

  • David Kreitschmann. User Manual for the Apple CoreCapture Framework. arXiv:1808.07353, 2018. PDF

So far, our work resulted in the disclosure of the following security vulnerabilities (CVE entries):

If our project helps you to produce a publication which includes a bibliography, we appreciate it if you cite this project and the relevant papers. Find all references in our bibtex file. Here is the reference for the project only:

@electronic{owl:project,
	author = {Stute, Milan and Kreitschmann, David and Hollick, Matthias},
	title = {The Open Wireless Link Project},
	url = {https://owlink.org},
	year = {2018},
}