Bluetooth Hacking: A Case Study
Document Type
Journal Article
Publisher
Association of Digital Forensics, Security and Law
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Security Science / Centre for Security Research
RAS ID
8224
Abstract
This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.
Access Rights
free_to_read
Comments
Browning, D., & Kessler, G. C. (2009, January). Bluetooth hacking: A case study. In Proceedings of the Conference on Digital Forensics, Security and Law (p. 115). Association of Digital Forensics, Security and Law. Available here