Unauthorized Data Theft from Bluetooth-Enabled Devices Using RFCOMMVulnerabilities

The article is dedicated to the attacks on Bluetooth devices. The described attacks allow hackers to steal private data from mobile devices. The attack is based on vulnerabilities found in RFCOMM-level of Bluetooth protocols stack. The described attack is even more dangerous because of the fact that...

Full description

Bibliographic Details
Main Authors: A. G. Beltov, I. Y. Zhukov, A. V. Novitskiy
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2012-09-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/455

Similar Items