Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol

Published: 24 July 2019 Publication History

Abstract

Apple Wireless Direct Link (AWDL) is a proprietary protocol deployed in about 1.4 billion1 end-user devices consisting of Apple's main product families such as Mac, iPhone, iPad, Apple Watch, and Apple TV? effectively all recent Apple devices containing a Wi-Fi chip. Apple does not advertise the protocol but only vaguely refers to it as a "peer-to-peer Wi-Fi" technology [2]. Yet, it empowers popular applications such as AirDrop and AirPlay that transparently use AWDL without the user noticing. We believe that public knowledge of this undocumented protocol would be beneficial for the following reasons.

References

[1]
Apple Inc. (2018). Financial information-earnings releases and 10-K annual reports. https://investor. apple.com/investor-relations/default.aspx
[2]
Apple Inc. (2018). NSNetService class documentation. https://developer.apple.com/ documentation/foundation/nsnetservice
[3]
Nitay Artenstein. (2017). Broadpwn: Remotely compromising Android and iOS via a bug in Broadcom's Wi-Fi chipsets. https://blog.exodusintel. com/2017/07/26/broadpwn/
[4]
Gal Beniamini. (2017). Over the air: Exploiting Broadcom's Wi-Fi stack. (part 2). https:// googleprojectzero.blogspot.com/2017/04/overair- exploiting-broadcoms-wi-fi_11.html
[5]
Bluetooth Special Interest Group. (2016). Bluetooth core specification.
[6]
GitHub. (2015). Leaked BCM4360 driver code. No longer available.
[7]
Florian Kohnhäuser, Milan Stute, Lars Baumgärtner, Lars Almon, Stefan Katzenbeisser, Matthias Hollick, and Bernd Freisleben. (2017). SEDCOS: A secure device-to-device communication system for disaster scenarios. In IEEE LCN '17.
[8]
Zongqing Lu, Guohong Cao, and La PortaThomas. (2016). "Networking smartphones for disaster recovery." In IEEE PerCom '16.
[9]
IEEE Computer Society. (2016). Wireless LAN medium access control (MAC) and physical layer (PHY) specification.
[10]
Milan Stute, David Kreitschmann, and Matthias Hollick. (2018). Demo: Linux goes apple picking: Cross-platform ad hoc communication with Apple Wireless Direct Link. In ACM MobiCom '18.
[11]
Milan Stute, David Kreitschmann, and Matthias Hollick. (2018). One billion apples' secret sauce: Recipe for the Apple Wireless Direct Link ad hoc protocol. In ACM MobiCom '18.
[12]
Milan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, and Matthias Hollick. (2019). A billion open interfaces for Eve and Mallory: MitM, DoS, and tracking attacks on iOS and macOS through Apple Wireless Direct Link. In USENIX Security '19 (accepted).
[13]
Wi-Fi Alliance. (2015). Neighbor Awareness Networking technical specification.
[14]
Wi-Fi Alliance. (2016). Wi-Fi peer-to-peer (P2P) technical specification. http://www. wi-fi.org/file/wi-fi-peer-to-peer-p2p-technicalspecification- v17

Cited By

View all
  • (2022)Unsupervised Binary Protocol Clustering Based on Maximum Sequential PatternsComputer Modeling in Engineering & Sciences10.32604/cmes.2022.017467130:1(483-498)Online publication date: 2022

Index Terms

  1. Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol
    Index terms have been assigned to the content through auto-classification.

    Comments

    Information & Contributors

    Information

    Published In

    cover image GetMobile: Mobile Computing and Communications
    GetMobile: Mobile Computing and Communications  Volume 23, Issue 1
    March 2019
    34 pages
    ISSN:2375-0529
    EISSN:2375-0537
    DOI:10.1145/3351422
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 July 2019
    Published in SIGMOBILE-GETMOBILE Volume 23, Issue 1

    Check for updates

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)71
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 30 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Unsupervised Binary Protocol Clustering Based on Maximum Sequential PatternsComputer Modeling in Engineering & Sciences10.32604/cmes.2022.017467130:1(483-498)Online publication date: 2022

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media