2010 | OriginalPaper | Chapter
Mining Bluetooth Attacks in Smart Phones
Authors : Seyed Morteza Babamir, Reyhane Nowrouzi, Hadi Naseri
Published in: Networked Digital Technologies
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
The Bluetooth port of the Smart Phones is subject to threat of attacks of Bluesnarfing, Bluejacking and Bluebugging. In this paper, we aim to deal with mining these attacks. Having explained properties of the three attack types, we state three typical cases of them including SMS manipulation, phone book manipulation, and phone call initiation. According to characteristics of each attack type, we model the attacks by using Colored Petri-Nets and then mine the models. To show correctness of our models, we verify their liveness, fairness, and boundness properties. Finally, we mine models to analyze attacks.