Bluetooth Hacking: A Case Study

<p class="JDFSLParagraph">This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communicati...

Full description

Bibliographic Details
Main Authors: Dennis Browning, Gary C. Kessler
Format: Article
Language:English
Published: Association of Digital Forensics, Security and Law 2009-06-01
Series:Journal of Digital Forensics, Security and Law
Online Access:http://ojs.jdfsl.org/index.php/jdfsl/article/view/164
Description
Summary:<p class="JDFSLParagraph">This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.</p>
ISSN:1558-7215
1558-7223