首页> 外文会议>Military Communications Conference, 2009. MILCOM 2009 >Building a dark piconet upon Bluetooth interfaces of computers
【24h】

Building a dark piconet upon Bluetooth interfaces of computers

机译:在计算机的蓝牙接口上构建暗微微网

获取原文

摘要

In this paper we demonstrate an attack scenario in which Bluetooth enabled computers are remotely controlled by an attacker without any security software detecting the connection. We describe in detail the methods to deliver malware, evade detection, elevate permissions, and transport critical information out of the network via Bluetooth connections. A prototype system using state-of-the-art operating systems and security software is built to show the practicability of the attack. We also study different mitigation strategies along with their downside. Security improvements for similar scenarios are also discussed.
机译:在本文中,我们演示了一种攻击情形,在该情形下,攻击者可以远程控制启用蓝牙的计算机,而没有任何安全软件可以检测到该连接。我们详细描述了通过蓝牙连接传送恶意软件,逃避检测,提升权限以及将关键信息传输出网络的方法。构建了一个使用最新操作系统和安全软件的原型系统,以展示攻击的实用性。我们还研究了不同的缓解策略以及它们的缺点。还讨论了类似方案的安全性改进。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号