Bluetooth Hacking: A Case Study

  • Browning D
  • Kessler G
N/ACitations
Citations of this article
43Readers
Mendeley users who have this article in their library.

Abstract

This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.

Cite

CITATION STYLE

APA

Browning, D., & Kessler, G. (2009). Bluetooth Hacking: A Case Study. Journal of Digital Forensics, Security and Law. https://doi.org/10.15394/jdfsl.2009.1058

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free