Title

Bluetooth Hacking: A Case Study

Document Type

Journal Article

Publisher

Association of Digital Forensics, Security and Law

Faculty

Computing, Health and Science

School

Computer and Security Science, Centre for Security Research

RAS ID

8224

Comments

This article was originally published as: Browning, D., & Kessler, G. C. (2009, January). Bluetooth hacking: A case study. In Proceedings of the Conference on Digital Forensics, Security and Law (p. 115). Association of Digital Forensics, Security and Law. Original available here

Abstract

This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.

Access Rights

open access