Building a dark piconet upon bluetooth interfaces of computers

  • Authors:
  • Rodney Owens;Weichao Wang

  • Affiliations:
  • Department of Software and Information Systems, University of North Carolina at Charlotte, NC;Department of Software and Information Systems, University of North Carolina at Charlotte, NC

  • Venue:
  • MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we demonstrate an attack scenario in which Bluetooth enabled computers are remotely controlled by an attacker without any security software detecting the connection. We describe in detail the methods to deliver malware, evade detection, elevate permissions, and transport critical information out of the network via Bluetooth connections. A prototype system using state-of-the-art operating systems and security software is built to show the practicability of the attack. We also study different mitigation strategies along with their downside. Security improvements for similar scenarios are also discussed.