BLUEBORNE VULNERABILITIES IN BLUETOOTH IMPLEMENTATIONS IN DIFFERENT OPERATION SYSTEMS

Abstract

Ubiquitous adaptation of protocols and technologies for implementations of old solutions in new platform make it more unsecured. That leads to constant change and adaptation. Many solutions aren’t revised and insufficiently tested, which is connected to spectrum of systems and devices. It isn’t surprising that one of the main and most popular technology stacks - Bluetooth have serious vulnerabilities.

Authors and Affiliations

Konstiantyn Tykhonov

Keywords

Related Articles

CRYOSKOPIC TEMPERATURE OF REDUCED FATTY CREAM

The article presents the results of determination of the cryoscopic temperature of cream with low fat content. The influence of sodium alginate and j-carrageenan on the nature of freezing of water in the system is shown....

COMPARING TYPESCRIPT AND JAVASCRIPT PROGRAMMING LANGUAGES IN MODERN WEB APPLICATIONS DEVELOPMENT

Were compared TypeScript and JavaScript programming languages, were shown, that TypeScript usage simplifies web-application development and testing.

TRANSPORT TRAFFIC AT CROSSROADS MODELING FOR REGULATION PROCESS OPRIMISATION

This paper concerns methods of control transport traffic at crossroads modeling for regulation process optimization by Dijkstra’s algorithm and Ford-Fulkerson.

A MECHANISM OF MANAGEMENT AND PROVIDING OF FINANCIAL FIRMNESS IS ON ENTERPRISE

Essence and necessity of management and providing of financial stability is certain on an enterprise. The analysis of level of financial stability of enterprises is carried out in Ukraine. The mechanism of management fin...

FEATURES A SELECTION CRITERION OF OPTIMAL CONTROL

The main problem is the difficulty of selecting the optimal index for the assessment of business operations. The paper considers the possibility of bringing the registration model system operations. Mathematical processi...

Download PDF file
  • EP ID EP610336
  • DOI -
  • Views 80
  • Downloads 0

How To Cite

Konstiantyn Tykhonov (2018). BLUEBORNE VULNERABILITIES IN BLUETOOTH IMPLEMENTATIONS IN DIFFERENT OPERATION SYSTEMS. Международный научный журнал "Интернаука", 1(13), 36-38. https://europub.co.uk/articles/-A-610336