Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX Vulnerabilities

The article is dedicated to the attacks on Bluetooth devices. The described attacks allow hackers to steal private data from mobile devices. The attack is based on vulnerabilities found in OBEX and OBEX FTP profiles of Bluetooth protocols stack.

Bibliographic Details
Published in:Безопасность информационных технологий
Main Authors: A. G. Beltov, I. Y. Zhukov, A. V. Novitskiy, D. M. Mikhailov, A. V. Starikovskiy
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2012-09-01
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/454
_version_ 1851939162588971008
author A. G. Beltov
I. Y. Zhukov
A. V. Novitskiy
D. M. Mikhailov
A. V. Starikovskiy
author_facet A. G. Beltov
I. Y. Zhukov
A. V. Novitskiy
D. M. Mikhailov
A. V. Starikovskiy
author_sort A. G. Beltov
collection DOAJ
container_title Безопасность информационных технологий
description The article is dedicated to the attacks on Bluetooth devices. The described attacks allow hackers to steal private data from mobile devices. The attack is based on vulnerabilities found in OBEX and OBEX FTP profiles of Bluetooth protocols stack.
format Article
id doaj-art-e356df2bd76442a786c4e08ab797148f
institution Directory of Open Access Journals
issn 2074-7128
2074-7136
language English
publishDate 2012-09-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
spelling doaj-art-e356df2bd76442a786c4e08ab797148f2025-08-19T21:51:04ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362012-09-01192S5456444Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX VulnerabilitiesA. G. BeltovI. Y. ZhukovA. V. NovitskiyD. M. MikhailovA. V. StarikovskiyThe article is dedicated to the attacks on Bluetooth devices. The described attacks allow hackers to steal private data from mobile devices. The attack is based on vulnerabilities found in OBEX and OBEX FTP profiles of Bluetooth protocols stack.https://bit.mephi.ru/index.php/bit/article/view/454BluetoothOBEXOBEX FTPBluetoothOBEXOBEX FTPmobile phones attacks
spellingShingle A. G. Beltov
I. Y. Zhukov
A. V. Novitskiy
D. M. Mikhailov
A. V. Starikovskiy
Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX Vulnerabilities
Bluetooth
OBEX
OBEX FTP
Bluetooth
OBEX
OBEX FTP
mobile phones attacks
title Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX Vulnerabilities
title_full Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX Vulnerabilities
title_fullStr Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX Vulnerabilities
title_full_unstemmed Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX Vulnerabilities
title_short Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX Vulnerabilities
title_sort unauthorized data theft from bluetooth enabled devices using obex vulnerabilities
topic Bluetooth
OBEX
OBEX FTP
Bluetooth
OBEX
OBEX FTP
mobile phones attacks
url https://bit.mephi.ru/index.php/bit/article/view/454
work_keys_str_mv AT agbeltov unauthorizeddatatheftfrombluetoothenableddevicesusingobexvulnerabilities
AT iyzhukov unauthorizeddatatheftfrombluetoothenableddevicesusingobexvulnerabilities
AT avnovitskiy unauthorizeddatatheftfrombluetoothenableddevicesusingobexvulnerabilities
AT dmmikhailov unauthorizeddatatheftfrombluetoothenableddevicesusingobexvulnerabilities
AT avstarikovskiy unauthorizeddatatheftfrombluetoothenableddevicesusingobexvulnerabilities