Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX Vulnerabilities
The article is dedicated to the attacks on Bluetooth devices. The described attacks allow hackers to steal private data from mobile devices. The attack is based on vulnerabilities found in OBEX and OBEX FTP profiles of Bluetooth protocols stack.
| Published in: | Безопасность информационных технологий |
|---|---|
| Main Authors: | , , , , |
| Format: | Article |
| Language: | English |
| Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2012-09-01
|
| Subjects: | |
| Online Access: | https://bit.mephi.ru/index.php/bit/article/view/454 |
| _version_ | 1851939162588971008 |
|---|---|
| author | A. G. Beltov I. Y. Zhukov A. V. Novitskiy D. M. Mikhailov A. V. Starikovskiy |
| author_facet | A. G. Beltov I. Y. Zhukov A. V. Novitskiy D. M. Mikhailov A. V. Starikovskiy |
| author_sort | A. G. Beltov |
| collection | DOAJ |
| container_title | Безопасность информационных технологий |
| description | The article is dedicated to the attacks on Bluetooth devices. The described attacks allow hackers to steal private data from mobile devices. The attack is based on vulnerabilities found in OBEX and OBEX FTP profiles of Bluetooth protocols stack. |
| format | Article |
| id | doaj-art-e356df2bd76442a786c4e08ab797148f |
| institution | Directory of Open Access Journals |
| issn | 2074-7128 2074-7136 |
| language | English |
| publishDate | 2012-09-01 |
| publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
| record_format | Article |
| spelling | doaj-art-e356df2bd76442a786c4e08ab797148f2025-08-19T21:51:04ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362012-09-01192S5456444Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX VulnerabilitiesA. G. BeltovI. Y. ZhukovA. V. NovitskiyD. M. MikhailovA. V. StarikovskiyThe article is dedicated to the attacks on Bluetooth devices. The described attacks allow hackers to steal private data from mobile devices. The attack is based on vulnerabilities found in OBEX and OBEX FTP profiles of Bluetooth protocols stack.https://bit.mephi.ru/index.php/bit/article/view/454BluetoothOBEXOBEX FTPBluetoothOBEXOBEX FTPmobile phones attacks |
| spellingShingle | A. G. Beltov I. Y. Zhukov A. V. Novitskiy D. M. Mikhailov A. V. Starikovskiy Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX Vulnerabilities Bluetooth OBEX OBEX FTP Bluetooth OBEX OBEX FTP mobile phones attacks |
| title | Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX Vulnerabilities |
| title_full | Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX Vulnerabilities |
| title_fullStr | Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX Vulnerabilities |
| title_full_unstemmed | Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX Vulnerabilities |
| title_short | Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX Vulnerabilities |
| title_sort | unauthorized data theft from bluetooth enabled devices using obex vulnerabilities |
| topic | Bluetooth OBEX OBEX FTP Bluetooth OBEX OBEX FTP mobile phones attacks |
| url | https://bit.mephi.ru/index.php/bit/article/view/454 |
| work_keys_str_mv | AT agbeltov unauthorizeddatatheftfrombluetoothenableddevicesusingobexvulnerabilities AT iyzhukov unauthorizeddatatheftfrombluetoothenableddevicesusingobexvulnerabilities AT avnovitskiy unauthorizeddatatheftfrombluetoothenableddevicesusingobexvulnerabilities AT dmmikhailov unauthorizeddatatheftfrombluetoothenableddevicesusingobexvulnerabilities AT avstarikovskiy unauthorizeddatatheftfrombluetoothenableddevicesusingobexvulnerabilities |
