• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹Á¤º¸Åë½ÅÇÐȸ Çмú´ëȸ > 2011³â Ãá°èÇмú´ëȸ

2011³â Ãá°èÇмú´ëȸ

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ºí·çÅõ½ºÀÇ º¸¾È Ãë¾à¼º°ú °ø°Ý
¿µ¹®Á¦¸ñ(English Title) Vulnerability and Attacks of Bluetooth System
ÀúÀÚ(Author) ÀÌÀιü   ·ù´ëÇö   In-Baum Rhee   Dae-Hyun Ryu  
¿ø¹®¼ö·Ïó(Citation) VOL 15 NO. 01 PP. 0650 ~ 0653 (2011. 05)
Çѱ۳»¿ë
(Korean Abstract)
º» ³í¹®¿¡¼­´Â ¸ÕÀú ºí·çÅõ½º ½Ã½ºÅÛ°ú ºí·çÅõ½º Á¤º¸º¸È£¿¡ ´ëÇØ ¼³¸íÇÏ¿´°í, ¶ÇÇÑ ºí·çÅõ½º ±Ô°Ý¿¡¼­ Á¤ÀÇÇÏ°í ÀÖ´Â Á¤º¸º¸È£ ±¸Á¶¸¦ ºÐ¼®ÇÏ°í ±× Ãë¾à¼ºÀ» Á¦½ÃÇÏ°í, ´Ù¾çÇÑ ºí·çÅõ½º ÇØÅ· ±â¹ýµéÀ» ¼Ò°³ÇÏ¿´´Ù. ¶ÇÇÑ CarWhisperer¸¦ ÀÌ¿ëÇÏ¿© ÈÞ´ëÆù¿¡ »ç¿ëÇÏ´Â ÇÚÁîÇÁ¸®¿¡ Àû¿ëÇÏ¿© ÇÚÁîÇÁ¸®¿¡ ÀÓÀÇÀÇ À½¼º ¸Þ½ÃÁö¸¦ ÁÖÀÔÇÏ´Â °ø°Ý°ú ÇÚÁîÇÁ¸®¸¦ ÅëÇØ ´ëÈ­ÇÏ´Â ³»¿ëÀ» ³ìÀ½ÇÏ¿© ÆÄÀÏ·Î ÀúÀåÇÏ´Â °ø°Ý °úÁ¤À» ¼öÇàÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
In this paper, we describe Bluetooth system and Bluetooth security. And we analyze the structure of information security and vulnerability, introduced one of Bluetooth hacking techniques. We show a demo of the attack process to inject arbitrary hands-free voice messages and save the file information, recording a conversation through hands-free device.
Å°¿öµå(Keyword) ºí·çÅõ½º   º¸¾È   Ãë¾à¼º   °ø°Ý   CarWhisperer   ÇÚÁîÇÁ¸®  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå