Title :
Building a dark piconet upon Bluetooth interfaces of computers
Author :
Owens, Rodney ; Wang, Weichao
Author_Institution :
Dept. of Software & Inf. Syst., Univ. of North Carolina at Charlotte, Charlotte, NC, USA
Abstract :
In this paper we demonstrate an attack scenario in which Bluetooth enabled computers are remotely controlled by an attacker without any security software detecting the connection. We describe in detail the methods to deliver malware, evade detection, elevate permissions, and transport critical information out of the network via Bluetooth connections. A prototype system using state-of-the-art operating systems and security software is built to show the practicability of the attack. We also study different mitigation strategies along with their downside. Security improvements for similar scenarios are also discussed.
Keywords :
Bluetooth; invasive software; operating systems (computers); personal area networks; telecommunication security; ubiquitous computing; Bluetooth interfaces; attack scenario; dark piconet; malware; operating systems; pervasive computing; security software; Application software; Bluetooth; Computer interfaces; Computer security; Data communication; Data security; Military computing; Personal area networks; Portable computers; Software systems;
Conference_Titel :
Military Communications Conference, 2009. MILCOM 2009. IEEE
Conference_Location :
Boston, MA
Print_ISBN :
978-1-4244-5238-5
Electronic_ISBN :
978-1-4244-5239-2
DOI :
10.1109/MILCOM.2009.5379892