MILCOM 2009 - 2009 IEEE Military Communications Conference 2009
DOI: 10.1109/milcom.2009.5379892
|View full text |Cite
|
Sign up to set email alerts
|

Building a dark piconet upon Bluetooth interfaces of computers

Abstract: In this paper we demonstrate an attack scenario in which Bluetooth enabled computers are remotely controlled by an attacker without any security software detecting the connection. We describe in detail the methods to deliver malware, evade detection, elevate permissions, and transport critical iriformation out ofthe network via Bluetooth connections. A prototype system using state-of-the-art operating systems and security software is built to show the practicability of the attack. We also study different mitig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…MMTT tool [11] which is permission based advertising to mobile phones target huge number. Remote Bluetooth computers are controlled by attackers without any security software is proposed in [12], in which data could be easily transported out of Bluetooth network.…”
Section: Introductionmentioning
confidence: 99%
“…MMTT tool [11] which is permission based advertising to mobile phones target huge number. Remote Bluetooth computers are controlled by attackers without any security software is proposed in [12], in which data could be easily transported out of Bluetooth network.…”
Section: Introductionmentioning
confidence: 99%