Bluetooth Hacking: A Case Study

Dennis Browning, Gary C. Kessler

Research output: Contribution to conferencePresentation

Abstract

"This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info."--from the paper.
Original languageAmerican English
StatePublished - May 2009
Externally publishedYes
EventProceedings of the Conference on Digital Forensics, Security and Law - Burlington, VT
Duration: May 1 2009 → …

Conference

ConferenceProceedings of the Conference on Digital Forensics, Security and Law
Period5/1/09 → …

Keywords

  • bluetooth hacking
  • mobile phone hacking
  • wireless hacking

Disciplines

  • Other Computer Engineering

Cite this