{"title":"RFID Hacking for Fun and Profit","authors":"Ju Wang, Omid Salehi-Abari, S. Keshav","doi":"10.1145/3351422.3351430","DOIUrl":"https://doi.org/10.1145/3351422.3351430","url":null,"abstract":"This paper shows how even hobbyists can transform commodity RFID tags into sensors by physically altering (\"hacking\") them using COTS sensors, a pair of scissors, and clear adhesive tape or conductive epoxy glue. Importantly, this requires no change to commercial RFID readers. We also propose a signal feature, namely Differential Minimum Response Threshold (DMRT), which is robust to the changes in an RF environment for the sensing. To validate our vision, we develop RFID-based sensors for features such as illuminance, temperature, and gestures. We believe our approach can open up the field of batteryless backscatter-based RFID sensing to the research community, making it an exciting area for future work.","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116509528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Open-Source Software and Hardware Platforms for Building Backscatter Systems","authors":"Chenren Xu, Pengyu Zhang","doi":"10.1145/3351422.3351428","DOIUrl":"https://doi.org/10.1145/3351422.3351428","url":null,"abstract":"In this article, we will provide a brief introduction of available opensource backscatter platforms that can be used by researchers and engineers to build interesting applications or investigate novel backscatter communication technologies. Instead of diving into the details of each platform, we will focus our discussion on the principles used in designing each platform and the unique feature provided by each platform. At the end of this article, we will discuss several key hardware and software modules that can be used by researchers or engineers to build their own backscatter platforms.","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123470613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Standards for Hardware Security","authors":"Ujjwal Guin, N. Asadizanjani, M. Tehranipoor","doi":"10.1145/3351422.3351424","DOIUrl":"https://doi.org/10.1145/3351422.3351424","url":null,"abstract":"Due to the globalization of design, manufacturing and distribution of integrated circuits (ICs), hardware underlying information systems have become increasingly vulnerable to a number of malicious attacks, primarily counterfeiting of ICs and piracy of intellectual properties (IPs). To ensure the security of our critical infrastructure, the use of trusted hardware is absolutely necessary. There are a handful of standards, either currently available today or in progress, that provide guidance to undertake hardware security issues. This article focuses on the standardization activity in the domain of hardware security.","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127146132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol","authors":"Milan Stute, David Kreitschmann, M. Hollick","doi":"10.1145/3351422.3351432","DOIUrl":"https://doi.org/10.1145/3351422.3351432","url":null,"abstract":"Apple Wireless Direct Link (AWDL) is a proprietary protocol deployed in about 1.4 billion1 end-user devices consisting of Apple's main product families such as Mac, iPhone, iPad, Apple Watch, and Apple TV? effectively all recent Apple devices containing a Wi-Fi chip. Apple does not advertise the protocol but only vaguely refers to it as a \"peer-to-peer Wi-Fi\" technology [2]. Yet, it empowers popular applications such as AirDrop and AirPlay that transparently use AWDL without the user noticing. We believe that public knowledge of this undocumented protocol would be beneficial for the following reasons.","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130074316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mehrdad Moradi, K. Sundaresan, Eugene Chai, S. Rangarajan, Z. Morley Mao
{"title":"Skycore: Moving Core to the Edge For Untethered and Reliable UAV-Based LTE Networks","authors":"Mehrdad Moradi, K. Sundaresan, Eugene Chai, S. Rangarajan, Z. Morley Mao","doi":"10.1145/3351422.3351431","DOIUrl":"https://doi.org/10.1145/3351422.3351431","url":null,"abstract":"Deploying LTE networks on modern UAVs requires a redesign of the key components of the LTE architecture. In this article, we propose a radical, edge-EPC design, called SkyCore, that pushes one of its central functionalities, namely its evolved packet core (EPC) to the extreme edge of the LTE network - collapses the EPC into a single, lightweight, selfcontained entity that is co-located with each of the UAV base-stations. SkyCore incorporates elements that are designed to address the unique challenges facing such a distributed design in the UAV environment, namely the resource-constrained nature of UAV platforms, and the distributed management of UAV and user mobility. We build and deploy a fully functional SkyCore system on a multi-UAV LTE network and showcase its (i) ability to interoperate with commercial LTE basestations as well as smartphones, (ii) support for both hotspot and standalone multi-UAV deployments, and (iii) robust control and data plane performance compared to other EPC variants in this inherently dynamic, unreliable environment.","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"11 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113942945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Noah Klugman, Meghan Clark, Matthew Podolsky, P. Pannuto, Jay Taneja, P. Dutta
{"title":"You Can't Teach a New Phone Old Tricks: Smartphones Resist Traditional Compute Roles","authors":"Noah Klugman, Meghan Clark, Matthew Podolsky, P. Pannuto, Jay Taneja, P. Dutta","doi":"10.1145/3351422.3351433","DOIUrl":"https://doi.org/10.1145/3351422.3351433","url":null,"abstract":"The smartphone is an incredible computing platform. Loaded with powerful processing, vast data storage, near-global connectivity, built-in batteries, and a rich array of sensors, these devices reliably service the needs of billions of users every day. However, when tasked to run just a single application continuously without any human interaction, the smartphone platform becomes surprisingly unreliable. Over the course of a four-month deployment of Android-phone-based cellular gateways in Zanzibar, Tanzania, all 16 deployed phones failed despite significant engineering efforts, and six phones became physically damaged. This article examines what went wrong and how mobile computing platforms could adapt to support more traditional embedded computing roles and workloads.","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134146307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Misra, Arunchandar Vasan, B. Krishnan, S. Venkatachari, A. Sivasubramaniam
{"title":"The Future of Smart Parking Systems with Parking 4.0","authors":"P. Misra, Arunchandar Vasan, B. Krishnan, S. Venkatachari, A. Sivasubramaniam","doi":"10.1145/3351422.3351426","DOIUrl":"https://doi.org/10.1145/3351422.3351426","url":null,"abstract":"Parking is important for mobility, access, and the economic development of cities. Evolving technology, new business opportunities, and a growing awareness are expanding the role of smart parking in sustainable city-scale mobility. The benefits from smart parking can get amplified manyfold as part of a cohesive, collaborative ecosystem. In this article, we present our vision of Parking 4.0 as a digital reimagination of the end-to-end value parking chain as part of a collaborative eco-system. We discuss the key market drivers and barriers in smart parking; assess the current readiness levels; and outline a path to Parking 4.0 while identifying opportunities and open research challenges.","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115696156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signpost: Enabling City-Scale Sensing for Citizens and Scientists","authors":"Joshua Adkins, Branden Ghena, P. Dutta","doi":"10.1145/3308755.3308763","DOIUrl":"https://doi.org/10.1145/3308755.3308763","url":null,"abstract":"The world's population is flocking to city centers at an increasing rate, testing the ability of urban planners and local governments to address new problems in transportation, waste disposal, urban health, and public safety. While one could imagine solutions enabled by an emerging class of smart sensors, current attempts at such systems are difficult to deploy and single purpose in their design. If we expect researchers and citizen-scientists to participate in the data-driven rejuvenation of our urban spaces (and we should, since they are the ones experiencing the day-to-day problems), we must lower the bar to deploying sensors and accessing smart-city data. Towards this goal, we present Signpost, an infrastructurefree sensing platform that aims to enable easy, multi-use sensor deployments for citizens, and researchers who have little expertise in building smart and connected sensors.[1]","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122757583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DeepXplore: Automated Whitebox Testing of Deep Learning Systems","authors":"Kexin Pei, Yinzhi Cao, Junfeng Yang, S. Jana","doi":"10.1145/3308755.3308767","DOIUrl":"https://doi.org/10.1145/3308755.3308767","url":null,"abstract":"Over the past few years, Deep Learning (DL) has made tremendous progress, achieving or surpassing human-level performance for a diverse set of tasks, including image classification, speech recognition, and playing games like Go. These advances have led to widespread adoption and deployment of DL in security- and safety-critical systems, such as selfdriving cars, malware detection, and aircraft collision avoidance systems.","PeriodicalId":213775,"journal":{"name":"GetMobile Mob. Comput. Commun.","volume":"646 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133171325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}