BreakMi talk at USA 2023 🐞

Our talk titled BreakMi: Reversing, Exploiting and Fixing Xiaomi (and Fitbit) Fitness Tracking Ecosystems has been accepted at USA'23. The talk extends and complements our paper titled BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem. The talk covers new relevant and educational aspect about our study that we did not have time to talk about during the paper presentation at CHES'22. For instance we will cover in detail:

  • Our reverse engineering methodology that the community can adopt to tackle similar problems.
  • BreakMi’s implementation details and attack demos from the BreakMi repository
  • The Fitbit fitness tracker ecosystem (owned by Google) and how BreakMi can be used to evaluate and exploit Fitbit fitness trackers
  • Responsible disclosure insights with Google and Xiaomi

Shout-out to our collaborators Eleonora Losiouk, Mauro Conti, and Mathias Payer!

Other relevant links:, Twitter, LinkedIn.

Daniele Antonioli
Daniele Antonioli
Assistant Professor

Research in cyber-physical and wireless system security

comments powered by Disqus