Unauthorized Obtaining of Bluetooth-Enabled Devices Data

The article is dedicated to the attacks on Bluetooth devices. The described attacks allow a hacker to get information about the device. The attack could be implemented both when the Bluetooth receiver works in the hidden mode and when the receiver is in the active mode.

Bibliographic Details
Main Authors: A. D. Prohorov, D. S. Krymov, S. D. Mizun, A. A. Pikhtulov
Format: Article
Language:English
Published: Moscow Engineering Physics Institute 2012-09-01
Series:Bezopasnostʹ Informacionnyh Tehnologij
Subjects:
SDP
Online Access:https://bit.mephi.ru/index.php/bit/article/view/452