Verifizieren der realen Anwendbarkeit von verbreiteten Bluetooth Sicherheitslücken
Verifizieren der realen Anwendbarkeit von verbreiteten Bluetooth Sicherheitslücken
Supervisor(s): | Ludwig Peuckert |
Status: | finished |
Topic: | Others |
Author: | Maximilian Tschirschnitz |
Submission: | 2020-09-30 |
Type of Thesis: | Guided Research |
DescriptionSince it's inception 30 years ago Bluetooth has developed to one of the most succesful and commonly used short-distance communication protocols. Over the years multiple potentialy harmful weaknesses have been found in it's specification. Evidently, assessing the viability and impact of such weaknesses is crucial for researchers, vendors and users alike. Few of the theorized attacks have yet been reproduced on actual unmodified hardware, though. Moreover, virtually none of the attack schemes were implemented and verified on Bluetooth's BR/EDR version. In this work we develop a framework that eases the development of Bluetooth-Security Proof of Concepts. We put the framework to the test by implementing two recent Bluetooth attacks. In a realistic user-adversary scenario we verify those implementations for the first time outside of a lab setting. |