Security Weaknesses in Bluetooth
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Correlation Properties of the Bluetooth Combiner Generator
ICISC '99 Proceedings of the Second International Conference on Information Security and Cryptology
BDD-Based Cryptanalysis of Keystream Generators
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
A preliminary investigation of worm infections in a bluetooth environment
Proceedings of the 4th ACM workshop on Recurring malcode
Studying Bluetooth Malware Propagation: The BlueBag Project
IEEE Security and Privacy
BlueSniff: Eve meets Alice and Bluetooth
WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies
New efficient intrusion detection and prevention system for Bluetooth networks
Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications
A proactive wireless self-protection system
Proceedings of the 5th international conference on Pervasive services
Spontaneous mobile device authentication based on sensor data
Information Security Tech. Report
Security issues in m-government
International Journal of Electronic Security and Digital Forensics
CellTrust: a reputation model for C2C commerce
Electronic Commerce Research
Technical opinion: Security threats of smart phones and Bluetooth
Communications of the ACM - Being Human in the Digital Age
Revisiting Bluetooth Security (Short Paper)
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Proximity-based authentication of mobile devices
International Journal of Security and Networks
Secure pairing with biometrics
International Journal of Security and Networks
Auxiliary channel Diffie-Hellman encrypted key-exchange authentication
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Amigo: proximity-based authentication of mobile devices
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
The Martini Synch: joint fuzzy hashing via error correction
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Repairing the bluetooth pairing protocol
Proceedings of the 13th international conference on Security protocols
Ensemble: cooperative proximity-based authentication
Proceedings of the 8th international conference on Mobile systems, applications, and services
BlueBat: towards practical bluetooth honeypots
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Building a dark piconet upon bluetooth interfaces of computers
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
BlueSnarf revisited: OBEX FTP service directory traversal
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Cryptanalysis of the bluetooth E0 cipher ssing OBDD's
ISC'06 Proceedings of the 9th international conference on Information Security
Improved pairing protocol for bluetooth
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
LoKey: leveraging the SMS network in decentralized, end-to-end trust establishment
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
Combinatorial structures for design of wireless sensor networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
SP 800-121. Guide to Bluetooth Security
SP 800-121. Guide to Bluetooth Security
SP 800-124. Guidelines on Cell Phone and PDA Security
SP 800-124. Guidelines on Cell Phone and PDA Security
Distinguishing users with capacitive touch communication
Proceedings of the 18th annual international conference on Mobile computing and networking
How to secure bluetooth-based pico networks
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
An updated threat model for security ceremonies
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Bluetooth: with low energy comes low security
WOOT'13 Proceedings of the 7th USENIX conference on Offensive Technologies
Hi-index | 0.00 |
This paper describes the implementation of an attack on the Bluetooth security mechanism. Specifically, we describe a passive attack, in which an attacker can find the PIN used during the pairing process. We then describe the cracking speed we can achieve through three optimizations methods. Our fastest optimization employs an algebraic representation of a central cryptographic primitive (SAFER+) used in Bluetooth. Our results show that a 4-digit PIN can be cracked in less than 0.3 sec on an old Pentium III 450MHz computer, and in 0.06 sec on a Pentium IV 3Ghz HT computer.