{"title":"调查蓝牙漏洞防范攻击","authors":"Nishi Patel, H. Wimmer, Carl M. Rebman","doi":"10.1109/ISMSIT52890.2021.9604655","DOIUrl":null,"url":null,"abstract":"Bluetooth devices can be compromised in various ways, which can lead to significant loss of data. In most cases hackers opt for denial service attacks, eavesdropping, resource misappropriation, and message modification. All these bear significant threats in terms of tampering with user data. In the evaluation, this paper used the Kali Linux platform and third-party system tools to test four Bluetooth compromise processes (Bluejacking, bluesmacking, bluesnarfing, and social engineering) on three different Bluetooth devices (HMDX Jam speaker, iPhone 6, and Nexus 7. The results revealed that hackers can execute the attacks without much effort and consequently tamper with information within the system. This paper also investigated how users could implement various protocols to secure their devices to limit the possibility of incurring intrusions from hackers.","PeriodicalId":120997,"journal":{"name":"2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Investigating Bluetooth Vulnerabilities to Defend from Attacks\",\"authors\":\"Nishi Patel, H. Wimmer, Carl M. Rebman\",\"doi\":\"10.1109/ISMSIT52890.2021.9604655\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Bluetooth devices can be compromised in various ways, which can lead to significant loss of data. In most cases hackers opt for denial service attacks, eavesdropping, resource misappropriation, and message modification. All these bear significant threats in terms of tampering with user data. In the evaluation, this paper used the Kali Linux platform and third-party system tools to test four Bluetooth compromise processes (Bluejacking, bluesmacking, bluesnarfing, and social engineering) on three different Bluetooth devices (HMDX Jam speaker, iPhone 6, and Nexus 7. The results revealed that hackers can execute the attacks without much effort and consequently tamper with information within the system. This paper also investigated how users could implement various protocols to secure their devices to limit the possibility of incurring intrusions from hackers.\",\"PeriodicalId\":120997,\"journal\":{\"name\":\"2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISMSIT52890.2021.9604655\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISMSIT52890.2021.9604655","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Investigating Bluetooth Vulnerabilities to Defend from Attacks
Bluetooth devices can be compromised in various ways, which can lead to significant loss of data. In most cases hackers opt for denial service attacks, eavesdropping, resource misappropriation, and message modification. All these bear significant threats in terms of tampering with user data. In the evaluation, this paper used the Kali Linux platform and third-party system tools to test four Bluetooth compromise processes (Bluejacking, bluesmacking, bluesnarfing, and social engineering) on three different Bluetooth devices (HMDX Jam speaker, iPhone 6, and Nexus 7. The results revealed that hackers can execute the attacks without much effort and consequently tamper with information within the system. This paper also investigated how users could implement various protocols to secure their devices to limit the possibility of incurring intrusions from hackers.