Bluetooth Hacking: A Case Study
<p class="JDFSLParagraph">This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communicati...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Association of Digital Forensics, Security and Law
2009-06-01
|
Series: | Journal of Digital Forensics, Security and Law |
Online Access: | http://ojs.jdfsl.org/index.php/jdfsl/article/view/164 |
id |
doaj-7482a6949cfe4f97970f4a88cdd5ce73 |
---|---|
record_format |
Article |
spelling |
doaj-7482a6949cfe4f97970f4a88cdd5ce732020-11-25T02:26:13ZengAssociation of Digital Forensics, Security and LawJournal of Digital Forensics, Security and Law1558-72151558-72232009-06-0142577287Bluetooth Hacking: A Case StudyDennis Browning0Gary C. Kessler1Champlain College Center for Digital Investigation Burlington, VermontEdith Cowan University<p class="JDFSLParagraph">This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.</p>http://ojs.jdfsl.org/index.php/jdfsl/article/view/164 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Dennis Browning Gary C. Kessler |
spellingShingle |
Dennis Browning Gary C. Kessler Bluetooth Hacking: A Case Study Journal of Digital Forensics, Security and Law |
author_facet |
Dennis Browning Gary C. Kessler |
author_sort |
Dennis Browning |
title |
Bluetooth Hacking: A Case Study |
title_short |
Bluetooth Hacking: A Case Study |
title_full |
Bluetooth Hacking: A Case Study |
title_fullStr |
Bluetooth Hacking: A Case Study |
title_full_unstemmed |
Bluetooth Hacking: A Case Study |
title_sort |
bluetooth hacking: a case study |
publisher |
Association of Digital Forensics, Security and Law |
series |
Journal of Digital Forensics, Security and Law |
issn |
1558-7215 1558-7223 |
publishDate |
2009-06-01 |
description |
<p class="JDFSLParagraph">This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.</p> |
url |
http://ojs.jdfsl.org/index.php/jdfsl/article/view/164 |
work_keys_str_mv |
AT dennisbrowning bluetoothhackingacasestudy AT garyckessler bluetoothhackingacasestudy |
_version_ |
1724848482865381376 |