id author title date pages extension mime words sentences flesch summary cache txt cord-251539-cl8caw0q Casagrande, Marco Contact Tracing Made Un-relay-able 2020-10-23 .txt text/plain 8478 505 57 Organization The rest of the paper is organized as follows: Section II provides background knowledge about the BLE technology, and the existing proximity tracing solutions for ACT apps; Section III introduces the system model and the threat model of the relay attack we designed against GAENbased ACT apps; Section IV outlines the design of ACTGuard; Section V describes our implementation of the relay attack against Immuni and our proof of concept of ACTGuard, i.e., ImmuniGuard; Section VI illustrates the related work concerning security and privacy issues of ACT apps; finally, in Section VII, we conclude the paper with a discussion about ACT apps. During our selection, we aimed to include entries for each of the most popular proximity tracing protocols, to represent a wide variety of countries and to showcase the various combination of technologies and privacy approaches with respect to the following criteria: the adopted proximity tracing protocol, the technology used for performing the contact tracing, the set of personal data required to be shared by the app user and, finally, the resilience to replay and relay attacks. ./cache/cord-251539-cl8caw0q.txt ./txt/cord-251539-cl8caw0q.txt