Bluetooth Hacking: A Case Study

<p class="JDFSLParagraph">This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communicati...

Full description

Bibliographic Details
Main Authors: Dennis Browning, Gary C. Kessler
Format: Article
Language:English
Published: Association of Digital Forensics, Security and Law 2009-06-01
Series:Journal of Digital Forensics, Security and Law
Online Access:http://ojs.jdfsl.org/index.php/jdfsl/article/view/164
id doaj-7482a6949cfe4f97970f4a88cdd5ce73
record_format Article
spelling doaj-7482a6949cfe4f97970f4a88cdd5ce732020-11-25T02:26:13ZengAssociation of Digital Forensics, Security and LawJournal of Digital Forensics, Security and Law1558-72151558-72232009-06-0142577287Bluetooth Hacking: A Case StudyDennis Browning0Gary C. Kessler1Champlain College Center for Digital Investigation Burlington, VermontEdith Cowan University<p class="JDFSLParagraph">This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.</p>http://ojs.jdfsl.org/index.php/jdfsl/article/view/164
collection DOAJ
language English
format Article
sources DOAJ
author Dennis Browning
Gary C. Kessler
spellingShingle Dennis Browning
Gary C. Kessler
Bluetooth Hacking: A Case Study
Journal of Digital Forensics, Security and Law
author_facet Dennis Browning
Gary C. Kessler
author_sort Dennis Browning
title Bluetooth Hacking: A Case Study
title_short Bluetooth Hacking: A Case Study
title_full Bluetooth Hacking: A Case Study
title_fullStr Bluetooth Hacking: A Case Study
title_full_unstemmed Bluetooth Hacking: A Case Study
title_sort bluetooth hacking: a case study
publisher Association of Digital Forensics, Security and Law
series Journal of Digital Forensics, Security and Law
issn 1558-7215
1558-7223
publishDate 2009-06-01
description <p class="JDFSLParagraph">This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.</p>
url http://ojs.jdfsl.org/index.php/jdfsl/article/view/164
work_keys_str_mv AT dennisbrowning bluetoothhackingacasestudy
AT garyckessler bluetoothhackingacasestudy
_version_ 1724848482865381376