default search action
Alexander Heinrich
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j3]Alexander Heinrich, Leon Würsching, Matthias Hollick:
Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection. Proc. Priv. Enhancing Technol. 2024(3): 353-371 (2024) - [c10]Max Granzow, Alexander Heinrich, Matthias Hollick, Marco Zimmerling:
Poster: Leveraging Apple's Find My Network for Large-Scale Distributed Sensing. MobiSys 2024: 666-667 - 2023
- [i8]Alexander Heinrich, Sören Krollmann, Florentin Putz, Matthias Hollick:
Smartphones with UWB: Evaluating the Accuracy and Reliability of UWB Ranging. CoRR abs/2303.11220 (2023) - 2022
- [c9]Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, Jiska Classen:
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging. USENIX Security Symposium 2022: 1343-1359 - [c8]Alexander Heinrich, Niklas Bittner, Matthias Hollick:
AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices. WISEC 2022: 26-38 - [c7]Jiska Classen, Alexander Heinrich, Robert Reith, Matthias Hollick:
Evil Never Sleeps: When Wireless Malware Stays On after Turning Off iPhones. WISEC 2022: 146-156 - [c6]Lukas Burg, Max Granzow, Alexander Heinrich, Matthias Hollick:
OpenHaystack Mobile - Tracking Custom Find My Accessories on Smartphones. WISEC 2022: 277-279 - [i7]Alexander Heinrich, Niklas Bittner, Matthias Hollick:
AirGuard - Protecting Android Users From Stalking Attacks By Apple Find My Devices. CoRR abs/2202.11813 (2022) - [i6]Jiska Classen, Alexander Heinrich, Robert Reith, Matthias Hollick:
Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones. CoRR abs/2205.06114 (2022) - 2021
- [j2]Alexander Heinrich, Milan Stute, Tim Kornhuber, Matthias Hollick:
Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System. Proc. Priv. Enhancing Technol. 2021(3): 227-245 (2021) - [c5]Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop. USENIX Security Symposium 2021: 3577-3594 - [c4]Milan Stute, Alexander Heinrich, Jannik Lorenz, Matthias Hollick:
Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi. USENIX Security Symposium 2021: 3917-3934 - [c3]Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop. WISEC 2021: 371-373 - [c2]Alexander Heinrich, Milan Stute, Matthias Hollick:
OpenHaystack: a framework for tracking personal bluetooth devices via Apple's massive find my network. WISEC 2021: 374-376 - [i5]Alexander Heinrich, Milan Stute, Tim Kornhuber, Matthias Hollick:
Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System. CoRR abs/2103.02282 (2021) - [i4]Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, Jiska Classen:
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging. CoRR abs/2111.05313 (2021) - [i3]Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop. IACR Cryptol. ePrint Arch. 2021: 481 (2021) - [i2]Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop. IACR Cryptol. ePrint Arch. 2021: 893 (2021) - 2020
- [j1]Tim Grube, Alexander Heinrich, Jan-Philipp Stroscher, Sabrina Schomberg:
Datensicherheit von Corona-Apps nach der DSGVO. Datenschutz und Datensicherheit 44(8): 501-505 (2020) - [i1]Alexander Heinrich, Milan Stute, Matthias Hollick:
DEMO: BTLEmap: Nmap for Bluetooth Low Energy. CoRR abs/2007.00349 (2020)
2010 – 2019
- 2019
- [c1]Milan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, Matthias Hollick:
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link. USENIX Security Symposium 2019: 37-54
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint