Безопасность информационных технологий (Sep 2012)

Unauthorized Obtaining of Bluetooth-Enabled Devices Data

  • A. D. Prohorov,
  • D. S. Krymov,
  • S. D. Mizun,
  • A. A. Pikhtulov

Journal volume & issue
Vol. 19, no. 2S
pp. 47 – 49

Abstract

Read online

The article is dedicated to the attacks on Bluetooth devices. The described attacks allow a hacker to get information about the device. The attack could be implemented both when the Bluetooth receiver works in the hidden mode and when the receiver is in the active mode.

Keywords