Abstract
The Bluetooth port of the Smart Phones is subject to threat of attacks of Bluesnarfing, Bluejacking and Bluebugging. In this paper, we aim to deal with mining these attacks. Having explained properties of the three attack types, we state three typical cases of them including SMS manipulation, phone book manipulation, and phone call initiation. According to characteristics of each attack type, we model the attacks by using Colored Petri-Nets and then mine the models. To show correctness of our models, we verify their liveness, fairness, and boundness properties. Finally, we mine models to analyze attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Brenner, B.: Mobile Carriers Admit to Malware Attacks (2007), http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1243513,00.html
Scarfone, K., Padgette, J.: Guide to Bluetooth Security, NIST Special Publication 800-121, National Institute of Standards and Technology (2008)
Loo, A.: Security Threats of Smart Phones and Bluetooth. Communications of ACM 52(3), 150–152 (2009)
Herfurt, M.: Bluesnarfing @ CeBIT 2004 - Detecting and attacking Bluetooth-enabled cell phones at the Hannover Fairground, pp. 1–12 (2004), http://trifinite.org/Downloads/BlueSnarf_CeBIT2004.pdf
Jensen, K.: Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use, 2nd edn. Springer, Heidelberg (2003)
Moffie, M., Kaeli, D.: Application Security Monitor, Special Issue on the workshop on binary instrumentation and application. ACM SIGARCH Computer Architecture News 33(5), 21–26 (2005)
Vanoverberghe, D., Piessens, F.: Supporting security monitor-aware development. In: Proceedings of the 3rd International Workshop on Software Engineering for Security Systems (SESS’07), USA, pp. 1–7. IEEE Computer Society, Los Alamitos (2007)
Babamir, S.M., Jalili, S.: A Logical Based Approach to Detection of Intrusions against Programs. In: Proceedings of the 2nd International Conference on Global E-Security, London, pp. 72–79 (2006)
Tuohimaa, S., Leppanen, V.: A Compact Aspect-Based Security Monitor for J2ME applications. In: Proceedings of International Conference on Computer System and Technologies-CompSysTech’07, USA. ACM International Conference Proceeding Series, vol. 285, pp. VI.1.1–VI.1.6 (2007)
Buennemeyer, T., Nelson, T., Gora, M., Marchany, R., Trong, J.: Battery Polling and Trace Determination for Bluetooth Attack Detection in Mobile Devices. In: Proceedings of Information Assurance and Security Workshop, pp. 135–142. IEEE Press, Los Alamitos (2007)
OConnor, T., Reeves, T.: Bluetooth Network-Based Misuse Detection. In: Proceedings of Annual Computer Security Applications Conference, ACSAC 2008, USA, pp. 377–391. IEEE Press, Los Alamitos (2008), doi:10.1109/ACSAC.2008.39
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Babamir, S.M., Nowrouzi, R., Naseri, H. (2010). Mining Bluetooth Attacks in Smart Phones. In: Zavoral, F., Yaghob, J., Pichappan, P., El-Qawasmeh, E. (eds) Networked Digital Technologies. NDT 2010. Communications in Computer and Information Science, vol 87. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14292-5_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-14292-5_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14291-8
Online ISBN: 978-3-642-14292-5
eBook Packages: Computer ScienceComputer Science (R0)