Abstract
This paper investigates vulnerabilities within the Bluetooth host layer in Linux systems. It examines the Bluetooth protocol's evolution, focusing on its implementation in Linux, particularly through the BlueZ host software. Various vulnerabilities, including BleedingTooth, BLESA, and SweynTooth, are analyzed.
Faculty Advisor/Mentor
Shobha Vatsa
Document Type
Paper
Disciplines
Information Security
DOI
10.25777/6d1g-9c51
Publication Date
4-12-2024
Upload File
wf_yes
Included in
Investigating Vulnerabilities in the Bluetooth Host Layer in Linux
This paper investigates vulnerabilities within the Bluetooth host layer in Linux systems. It examines the Bluetooth protocol's evolution, focusing on its implementation in Linux, particularly through the BlueZ host software. Various vulnerabilities, including BleedingTooth, BLESA, and SweynTooth, are analyzed.