e-doping.info

Print dossier

Exploiting hardware vulnerabilities in mobile devices such as Bluetooth or related interfaces.

Infrastructure-Level Webb and Soh Layers 1-2 (Physical / Data Link) Counted as e-doping 1 article 0 evidence links
Infrastructure-Level Counted as e-doping

Mobile Device Exploits

Definition: Exploiting hardware vulnerabilities in mobile devices such as Bluetooth or related interfaces.

What OSI Layer This Cheat Affects: Layers 1-2 (Physical / Data Link)

Other Information: Exploiting hardware vulnerabilities in mobile devices such as Bluetooth or related interfaces.

Supporting Academic Articles

Taming the Blue Beast: A Survey of Bluetooth-Based Threats

John Paul Dunning

IEEE Security & Privacy March/April 2010

Target: Mobile device security threats via Bluetooth that could affect gaming (surveillance, malware, unauthorized access)

Aim: Dunning, J. P. (2010). Taming the blue beast: A survey of Bluetooth-based threats. IEEE Security & Privacy, 8(2), 20-27.

Recommendation: (Dunning, 2010)

Supporting or Related White Papers

No approved white papers are linked to this cheat yet.

Other Approved OSINT Sources

No other approved OSINT sources are linked to this cheat yet.

Known Cases

No known cases are linked to this cheat yet.