TUM Logo

Verifizieren der realen Anwendbarkeit von verbreiteten Bluetooth Sicherheitslücken

Verifizieren der realen Anwendbarkeit von verbreiteten Bluetooth Sicherheitslücken

Supervisor(s): Ludwig Peuckert
Status: finished
Topic: Others
Author: Maximilian Tschirschnitz
Submission: 2020-09-30
Type of Thesis: Guided Research

Description

Since it's inception 30 years ago Bluetooth has developed to one of the most succesful and commonly used short-distance
communication protocols.  Over the years multiple potentialy harmful weaknesses have been found in it's specification.
Evidently, assessing the viability and impact of such weaknesses is crucial for researchers, vendors and users alike.
Few of the theorized attacks have yet been reproduced on actual unmodified hardware, though.
Moreover, virtually none of the attack schemes were implemented and verified on Bluetooth's BR/EDR version.
In this work we develop a framework that eases the development of Bluetooth-Security Proof of Concepts.
We put the framework to the test by implementing two recent Bluetooth attacks.
In a realistic user-adversary scenario we verify those implementations for the first time outside of a lab setting.