DocumentCode :
3084211
Title :
Building a dark piconet upon Bluetooth interfaces of computers
Author :
Owens, Rodney ; Wang, Weichao
Author_Institution :
Dept. of Software & Inf. Syst., Univ. of North Carolina at Charlotte, Charlotte, NC, USA
fYear :
2009
fDate :
18-21 Oct. 2009
Firstpage :
1
Lastpage :
7
Abstract :
In this paper we demonstrate an attack scenario in which Bluetooth enabled computers are remotely controlled by an attacker without any security software detecting the connection. We describe in detail the methods to deliver malware, evade detection, elevate permissions, and transport critical information out of the network via Bluetooth connections. A prototype system using state-of-the-art operating systems and security software is built to show the practicability of the attack. We also study different mitigation strategies along with their downside. Security improvements for similar scenarios are also discussed.
Keywords :
Bluetooth; invasive software; operating systems (computers); personal area networks; telecommunication security; ubiquitous computing; Bluetooth interfaces; attack scenario; dark piconet; malware; operating systems; pervasive computing; security software; Application software; Bluetooth; Computer interfaces; Computer security; Data communication; Data security; Military computing; Personal area networks; Portable computers; Software systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Military Communications Conference, 2009. MILCOM 2009. IEEE
Conference_Location :
Boston, MA
Print_ISBN :
978-1-4244-5238-5
Electronic_ISBN :
978-1-4244-5239-2
Type :
conf
DOI :
10.1109/MILCOM.2009.5379892
Filename :
5379892
Link To Document :
بازگشت