A preliminary investigation of worm infections in a bluetooth environment

  • Authors:
  • Jing Su;Kelvin K. W. Chan;Andrew G. Miklas;Kenneth Po;Ali Akhavan;Stefan Saroiu;Eyal de Lara;Ashvin Goel

  • Affiliations:
  • University of Toronto;University of Toronto;University of Toronto;University of Toronto;University of Toronto;University of Toronto;University of Toronto;University of Toronto

  • Venue:
  • Proceedings of the 4th ACM workshop on Recurring malcode
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Over the past year, there have been several reports of malicious code exploiting vulnerabilities in the Bluetooth protocol. While the research community has started to investigate a diverse set of Bluetooth security issues, little is known about the feasibility and the propagation dynamics of a worm in a Bluetooth environment. This paper is an initial attempt to remedy this situation.We start by showing that the Bluetooth protocol design and implementation is large and complex. We gather traces and we use controlled experiments to investigate whether a large-scale Bluetooth worm outbreak is viable today. Our data shows that starting a Bluetooth worm infection is easy, once a vulnerability is discovered. Finally, we use trace-drive simulations to examine the propagation dynamics of Bluetooth worms. We find that Bluetooth worms can infect a large population of vulnerable devices relatively quickly, in just a few days.