期刊文献+

基于蓝牙移动设备的安全分析与防范

Security Analysis and Protection of Bluetooth Mobile Device
原文传递
导出
摘要 论文分析了目前广泛使用蓝牙功能的移动设备上存在的一些较为严重的安全漏洞和隐患,同时探讨了一些漏洞的攻击行为,最后给出了相应的防范措施。 This paper describes the serious security hole and hidden trouble in the mobile device, in which the Bluetooth module is incorporated. A number of Bluetooth attack methods are also discussed. Finally, the appropriated preventive measures are presented.
出处 《信息安全与通信保密》 2007年第7期76-78,81,共4页 Information Security and Communications Privacy
关键词 蓝牙 移动设备 PIN 攻击 对象交换协议 bluetooth mobile PIN attack OBEX
  • 相关文献

参考文献6

  • 1[1]Jakobsson M,Wetzel S.Security Weaknesses in Bluetooth[J].Lecture Notes in Computer Science,Springer Berlin/Heidelberg,2001.
  • 2[2]Yaniv Shaked,Avishai Wool.Cracking the Bluetooth PIN[C].3rd USENIX/ACM Conf.Mobile Systems,Applications,and Services (MobiSys).Seattle,WA,June 2005:39-50.
  • 3[3]Bluetooth SIG Security Expert Group.Bluetooth?Security White Paper,2002.
  • 4[4]Malachi Kenney.Ping of death[DB/CD].http://insecure.org/sploits/ping-o-death.html.1997.01.22.
  • 5[5]Nokia Corporation.AT Command Set For Nokia GSM and WCDMA Pmducts.Forum.nokia.com.April 2,2004.
  • 6[6]SG.Bluetooth specification[DB/CD].https://www.bluetooth.org/spec/.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部