July 26, 2022, 1:20 a.m. | Ankit Gangwal, Shubham Singh, Riccardo Spolaor, Abhijeet Srivastava

cs.CR updates on arXiv.org arxiv.org

Bluetooth technology has enabled short-range wireless communication for
billions of devices. Bluetooth Low-Energy (BLE) variant aims at improving power
consumption on battery-constrained devices. BLE-enabled devices broadcast
information (e.g., as beacons) to nearby devices via advertisements.
Unfortunately, such functionality can become a double-edged sword at the hands
of attackers. In this paper, we primarily show how an attacker can exploit BLE
advertisements to exfiltrate information from BLE-enable devices. In
particular, our attack establishes a communication medium between two devices
without requiring …

ble data data exfiltration exfiltration

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)