Studying Bluetooth Malware Propagation: The BlueBag Project

Bluetooth worms currently pose relatively little danger compared to Internet scanning worms. The BlueBag project shows targeted attacks through Bluetooth malware using proof-of-concept codes and mobile devices

[1]  Eric Filiol,et al.  Open Problems in Computer Virology , 2006, Journal in Computer Virology.

[2]  Michael Bailey,et al.  Shining Light on Dark Address Space , 2001 .

[3]  Giuseppe Serazzi,et al.  Computer Virus Propagation Models , 2003, MASCOTS Tutorials.

[4]  Scott F. Midkiff,et al.  Demonstrating vulnerabilities in Bluetooth security , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[5]  Yuh-Jzer Joung,et al.  An ns-based Bluetooth topology construction simulation environment , 2003, 36th Annual Simulation Symposium, 2003..

[6]  Steve R. White,et al.  Open Problems in Computer Virus Research , 1998 .

[7]  Cecilia Mascolo,et al.  A community based mobility model for ad hoc network research , 2006, REALMAN '06.

[8]  Weibo Gong,et al.  Email Virus Propagation Modeling and Analysis , 2003 .

[9]  Herbert W. Hethcote,et al.  The Mathematics of Infectious Diseases , 2000, SIAM Rev..

[10]  Avishai Wool,et al.  Cracking the Bluetooth PIN , 2005, MobiSys '05.

[11]  Robert Morrow Bluetooth Implementation and Use , 2002 .

[12]  Markus Jakobsson,et al.  Security Weaknesses in Bluetooth , 2001, CT-RSA.

[13]  Vern Paxson,et al.  How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.

[14]  Eugene H. Spafford,et al.  Crisis and aftermath , 1989, Commun. ACM.

[15]  M. Hannikainen,et al.  Design and implementation of an enhanced security layer for Bluetooth , 2005, Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005..

[16]  Jeffrey O. Kephart,et al.  Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.