How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
Distributed Construction and Maintenance of Bandwidth and Energy Efficient Bluetooth Scatternets
IEEE Transactions on Parallel and Distributed Systems
Studying Bluetooth Malware Propagation: The BlueBag Project
IEEE Security and Privacy
An overlapping communication protocol using improved time-slot leasing for Bluetooth WPANs
Journal of Network and Computer Applications
Hi-index | 0.00 |
Bluetooth technology BT and the inherent security vulnerabilities it introduces into business domains are often overlooked when security policies are developed. However, the International Data Corporation IDC projected that global Bluetooth short-wave wire semiconductor revenue will triple from $1.7 billion in 2007, to $3.3 billion in 2012 Reidy, 2008. After a brief history of Bluetooth technology, researchers will examine how Bluetooth works, its vulnerabilities, and how these vulnerabilities can be exploited. Bluetooth malware and its associated risks will also be explored. As a practical approach to monitor Bluetooth threats and malware, the employment of a Bluetooth honeypot will be discussed, including honeypot structure and the legalities of deploying them. Building on Andrew Smith's earlier work developing Bluepot, a functional Bluetooth honeypot Smith, 2011, researchers will test Bluepot and discuss the feasibility of using it as a prototype for developing a functional Bluetooth honeypot to secure corporate data and analyze BT malware.