2011³â Ãá°èÇмú´ëȸ
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
ºí·çÅõ½ºÀÇ º¸¾È Ãë¾à¼º°ú °ø°Ý |
¿µ¹®Á¦¸ñ(English Title) |
Vulnerability and Attacks of Bluetooth System |
ÀúÀÚ(Author) |
ÀÌÀιü
·ù´ëÇö
In-Baum Rhee
Dae-Hyun Ryu
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 15 NO. 01 PP. 0650 ~ 0653 (2011. 05) |
Çѱ۳»¿ë (Korean Abstract) |
º» ³í¹®¿¡¼´Â ¸ÕÀú ºí·çÅõ½º ½Ã½ºÅÛ°ú ºí·çÅõ½º Á¤º¸º¸È£¿¡ ´ëÇØ ¼³¸íÇÏ¿´°í, ¶ÇÇÑ ºí·çÅõ½º ±Ô°Ý¿¡¼ Á¤ÀÇÇÏ°í ÀÖ´Â Á¤º¸º¸È£ ±¸Á¶¸¦ ºÐ¼®ÇÏ°í ±× Ãë¾à¼ºÀ» Á¦½ÃÇÏ°í, ´Ù¾çÇÑ ºí·çÅõ½º ÇØÅ· ±â¹ýµéÀ» ¼Ò°³ÇÏ¿´´Ù. ¶ÇÇÑ CarWhisperer¸¦ ÀÌ¿ëÇÏ¿© ÈÞ´ëÆù¿¡ »ç¿ëÇÏ´Â ÇÚÁîÇÁ¸®¿¡ Àû¿ëÇÏ¿© ÇÚÁîÇÁ¸®¿¡ ÀÓÀÇÀÇ À½¼º ¸Þ½ÃÁö¸¦ ÁÖÀÔÇÏ´Â °ø°Ý°ú ÇÚÁîÇÁ¸®¸¦ ÅëÇØ ´ëÈÇÏ´Â ³»¿ëÀ» ³ìÀ½ÇÏ¿© ÆÄÀÏ·Î ÀúÀåÇÏ´Â °ø°Ý °úÁ¤À» ¼öÇàÇÏ¿´´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
In this paper, we describe Bluetooth system and Bluetooth security. And we analyze the structure of information security and vulnerability, introduced one of Bluetooth hacking techniques. We show a demo of the attack process to inject arbitrary hands-free voice messages and save the file information, recording a conversation through hands-free device.
|
Å°¿öµå(Keyword) |
ºí·çÅõ½º
º¸¾È
Ãë¾à¼º
°ø°Ý
CarWhisperer
ÇÚÁîÇÁ¸®
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|