Abstract

This paper investigates vulnerabilities within the Bluetooth host layer in Linux systems. It examines the Bluetooth protocol's evolution, focusing on its implementation in Linux, particularly through the BlueZ host software. Various vulnerabilities, including BleedingTooth, BLESA, and SweynTooth, are analyzed.

Faculty Advisor/Mentor

Shobha Vatsa

Document Type

Paper

Disciplines

Information Security

DOI

10.25777/6d1g-9c51

Publication Date

4-12-2024

Upload File

wf_yes

Share

COinS
 

Investigating Vulnerabilities in the Bluetooth Host Layer in Linux

This paper investigates vulnerabilities within the Bluetooth host layer in Linux systems. It examines the Bluetooth protocol's evolution, focusing on its implementation in Linux, particularly through the BlueZ host software. Various vulnerabilities, including BleedingTooth, BLESA, and SweynTooth, are analyzed.