Code-Red: a case study on the spread and victims of an internet worm
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Security Weaknesses in Bluetooth
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Correlation Properties of the Bluetooth Combiner Generator
ICISC '99 Proceedings of the Second International Conference on Information Security and Cryptology
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
Mobile Phones as Computing Devices: The Viruses are Coming!
IEEE Pervasive Computing
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Requirements on Worm Mitigation Technologies in MANETS
Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
Reality mining: sensing complex social systems
Personal and Ubiquitous Computing
Instrumenting the city: developing methods for observing and understanding the digital cityscape
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
SmartSiren: virus detection and alert for smartphones
Proceedings of the 5th international conference on Mobile systems, applications and services
Can you infect me now?: malware propagation in mobile phone networks
Proceedings of the 2007 ACM workshop on Recurring malcode
BlueSniff: Eve meets Alice and Bluetooth
WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies
Proximity breeds danger: emerging threats in metro-area wireless networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Efficient Node Discovery in Mobile Wireless Sensor Networks
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
EpiNet: a simulation framework to study the spread of malware in wireless networks
Proceedings of the 2nd International Conference on Simulation Tools and Techniques
BlueMonarch: a system for evaluating bluetooth applications in the wild
Proceedings of the 7th international conference on Mobile systems, applications, and services
VirusMeter: Preventing Your Cellphone from Spies
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
A random walk model for infection on graphs
Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools
Exploiting social interactions in mobile systems
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
CPMC: an efficient proximity malware coping scheme in smartphone-based mobile networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Building a dark piconet upon bluetooth interfaces of computers
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Evaluating Bluetooth as a medium for botnet command and control
DIMVA'10 Proceedings of the 7th international conference on Detection of intrusions and malware, and vulnerability assessment
A random walk model for infection on graphs: spread of epidemics & rumours with mobile agents
Discrete Event Dynamic Systems
From biological and social network metaphors to coupled bio-social wireless networks
International Journal of Autonomous and Adaptive Communications Systems
Why mobile-to-mobile wireless malware won't cause a storm
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
How to secure bluetooth-based pico networks
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones
Journal of Computer and System Sciences
Hi-index | 0.00 |
Over the past year, there have been several reports of malicious code exploiting vulnerabilities in the Bluetooth protocol. While the research community has started to investigate a diverse set of Bluetooth security issues, little is known about the feasibility and the propagation dynamics of a worm in a Bluetooth environment. This paper is an initial attempt to remedy this situation.We start by showing that the Bluetooth protocol design and implementation is large and complex. We gather traces and we use controlled experiments to investigate whether a large-scale Bluetooth worm outbreak is viable today. Our data shows that starting a Bluetooth worm infection is easy, once a vulnerability is discovered. Finally, we use trace-drive simulations to examine the propagation dynamics of Bluetooth worms. We find that Bluetooth worms can infect a large population of vulnerable devices relatively quickly, in just a few days.