Event / Presentation Title

Bluetooth Hacking: A Case Study

Proposal / Submission Type

Peer Reviewed Paper

Location

Burlington, Vermont

Start Date

21-5-2009 3:30 PM

Abstract

This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.

Keywords: Bluetooth hacking, mobile phone hacking, wireless hacking

 
May 21st, 3:30 PM

Bluetooth Hacking: A Case Study

Burlington, Vermont

This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.

Keywords: Bluetooth hacking, mobile phone hacking, wireless hacking