Proceedings 2019 Network and Distributed System Security Symposium 2019
DOI: 10.14722/ndss.2019.23482
|View full text |Cite
|
Sign up to set email alerts
|

BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals

Abstract: Bluetooth is a widely used communication technology, especially under the scenarios of mobile computing and Internet of Things. Once paired with a host device, a Bluetooth device then can exchange commands and data, such as voice, keyboard/mouse inputs, network, blood pressure data, and so on, with the host. Due to the sensitivity of such data and commands, some security measures have already been built into the Bluetooth protocol, like authentication, encryption, authorization, etc. The newly discovered vulne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…Due to system complexity and requirements, software and hardware security remain fundamentally difficult, with extensive vulnerabilities reported in each iteration of devices [14,68] and in their wired [69][70][71][72] and wireless [73,74] peripherals. Data extraction tools rely on these vulnerabilities [5,14,64] and have remained successful in practice [14,21,22,31], therefore our analysis focuses squarely on what confidentiality remains when these protections are bypassed.…”
Section: Threat Modelmentioning
confidence: 99%
“…Due to system complexity and requirements, software and hardware security remain fundamentally difficult, with extensive vulnerabilities reported in each iteration of devices [14,68] and in their wired [69][70][71][72] and wireless [73,74] peripherals. Data extraction tools rely on these vulnerabilities [5,14,64] and have remained successful in practice [14,21,22,31], therefore our analysis focuses squarely on what confidentiality remains when these protections are bypassed.…”
Section: Threat Modelmentioning
confidence: 99%
“…(ii) The attacker cannot physically access and unlock the mobile. (iii) Our attacks do not need malicious apps installed on the mobile, one difference to many other attacks which require malicious apps for Bluetooth exploitation [5,14,36,37]. (iv) Before the attack, the Android mobile and its peer device are paired using secure pairing protocols such as the Passkey Entry and Numerical Comparison.…”
Section: Threat Modelmentioning
confidence: 99%
“…We have implemented a prototype on Android 8 through the Android Open Source Project (AOSP) [25]. Please note co-located attacks through malwares are addressed in [5,14,36,37] and are out of the scope of this work.…”
Section: Countermeasuresmentioning
confidence: 99%
See 2 more Smart Citations