Document Type
Article
Publication/Presentation Date
2009
Abstract/Description
"This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info."--from the article
Publication Title
Journal of Digital Forensics, Security and Law
Publisher
Association of Digital Forensics, Security and Law
City
Maidens
Scholarly Commons Citation
Browning, D., & Kessler, G. C. (2009). Bluetooth Hacking: A Case Study. Journal of Digital Forensics, Security and Law, 4(2). Retrieved from https://commons.erau.edu/db-security-studies/26