SOK: A First Look into the Reproducibility of Bluetooth Attacks

JSYS 2024 May Papers Submission2 Authors

01 May 2024 (modified: 02 May 2024)JSYS 2024 May Papers SubmissionEveryoneRevisionsBibTeXCC BY-NC 4.0
Keywords: Bluetooth, attack, reproducibility, security
TL;DR: We implement the BIAS attack and discuss the reproducibility of BIAS and BLUFFS.
Abstract: We investigate the reproducibility of Bluetooth Impersonation AttackS (BIAS) and Bluetooth Forward and Future Secrecy (BLUFFS) attacks in our dissertation. Using a Raspberry Pi 3 Model B and a CYW920819M2EVB-01 evaluation board, we are able to reproduce BIAS and successfully attack target devices with it. We analyse the packets captured with various BIAS attacks, and compare them to a regular Bluetooth connection. We show the difficulties in implementing BLUFFS, but confirm that it is likely reproducible if we had significant computation resource on the evaluation board.
Area: System Security
Type: Systemization of Knowledge (SoK)
Conflicts: No known conflicts
Potential Reviewers: Daniele Antonioli
Revision: No
Contact Email: s2076830@ed.ac.uk
Submission Number: 2
Loading