Unauthorized Data Theft from Bluetooth-Enabled Devices Using RFCOMMVulnerabilities
The article is dedicated to the attacks on Bluetooth devices. The described attacks allow hackers to steal private data from mobile devices. The attack is based on vulnerabilities found in RFCOMM-level of Bluetooth protocols stack. The described attack is even more dangerous because of the fact that...
Main Authors: | A. G. Beltov, I. Y. Zhukov, A. V. Novitskiy |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2012-09-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/455 |
Similar Items
-
Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX Vulnerabilities
by: A. G. Beltov, et al.
Published: (2012-09-01) -
Unauthorized Obtaining of Bluetooth-Enabled Devices Data
by: A. D. Prohorov, et al.
Published: (2012-09-01) -
Vulnerabilities of Bluetooth Data Channel that Allow Intruders to Wiretrap User’s Data
by: P. E. Minin, et al.
Published: (2012-09-01) -
Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities
by: A. A. Pikhtulov, et al.
Published: (2012-09-01) -
Security Vulnerabilities in Bluetooth Technology as Used in IoT
by: Angela M. Lonzetta, et al.
Published: (2018-07-01)