{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:33Z","timestamp":1750309593729,"version":"3.41.0"},"reference-count":14,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T00:00:00Z","timestamp":1745971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["GetMobile: Mobile Comp. and Comm."],"published-print":{"date-parts":[[2025,4,30]]},"abstract":"<jats:p>Named after the Viking King Harald Bluetooth, Bluetooth is the de facto standard for short-range wireless communications. The introduction of Bluetooth Low Energy (BLE) and Mesh protocols has further paved the way for its domination in the era of IoT. Meanwhile, attacks against Bluetooth, such as BlueBorne [1] and BLESA [2], have been booming in the past few years, impacting billions of devices. Thus, in this paper, we summarize a systematization-of-knowledge paper [3] focusing on the diverse experimental methods in Bluetooth vulnerability identification and prevention to shed some light on the landscape of this research domain.<\/jats:p>","DOI":"10.1145\/3733892.3733894","type":"journal-article","created":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T04:18:14Z","timestamp":1746073094000},"page":"5-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing Bluetooth Across Layers: A Systematic Review of Protection Strategies"],"prefix":"10.1145","volume":"29","author":[{"given":"Jianliang","family":"Wu","sequence":"first","affiliation":[{"name":"Simon Fraser University, Burnaby, BC, Canada"}]},{"given":"Ruoyu","family":"Wu","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Dongyan","family":"Xu","sequence":"additional","affiliation":[{"name":"Purdue University, IN, USA"}]},{"given":"Dave (Jing)","family":"Tian","sequence":"additional","affiliation":[{"name":"Purdue University, IN, USA"}]},{"given":"Antonio","family":"Bianchi","sequence":"additional","affiliation":[{"name":"Purdue University, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,30]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Armis \"BlueBorne Technical White Paper \" https:\/\/www.armis.com\/research\/blueborne\/ 2020."},{"volume-title":"Proceedings of the USENIX Workshop on Offensive Technologies.","author":"Wu J.","key":"e_1_2_1_2_1","unstructured":"J. Wu, Y. Nan, V. Kumar, D. J. Tian, A. Bianchi, M. Payer, and D. Xu. 2020. BLESA: Spoofing attacks against reconnections in bluetooth low energy. Proceedings of the USENIX Workshop on Offensive Technologies."},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy.","author":"Wu J.","key":"e_1_2_1_3_1","unstructured":"J. Wu, R. Wu, D. Xu, D. J. Tian, and A. Bianchi. 2024. SoK: The long journey of exploiting and defending the legacy of King Harald bluetooth. Proceedings of the IEEE Symposium on Security and Privacy."},{"volume-title":"Proceedings of the USENIX Security Symposium.","author":"Costin A.","key":"e_1_2_1_4_1","unstructured":"A. Costin, J. Zaddach, A. Francillon, and D. Balzarotti. 2014. A large-scale analysis of the security of embedded firmwares. 2014. Proceedings of the USENIX Security Symposium."},{"volume-title":"Proceedings of the International Conference on Mobile Systems, Applications, and Services.","author":"Mantz D.","key":"e_1_2_1_5_1","unstructured":"D. Mantz, J. Classen, M. Schulz, and M. Hollick. 2019. InternalBlue -- bluetooth binary patching and experimentation framework. Proceedings of the International Conference on Mobile Systems, Applications, and Services."},{"volume-title":"Proceedings of the USENIX Annual Technical Conference.","author":"Garbelini M.E.","key":"e_1_2_1_6_1","unstructured":"M.E. Garbelini, C. Wang, S. Chattopadhyay, S. Sumei, and E. Kurniawan. 2020. SweynTooth: Unleashing mayhem over bluetooth low energy. Proceedings of the USENIX Annual Technical Conference."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1561\/9781680832075"},{"key":"e_1_2_1_8_1","volume":"202","author":"von Tschirschnitz M.","unstructured":"M. von Tschirschnitz, L. Peuckert, F. Franzen, and J. Grossklags. 2021. Method confusion attack on bluetooth pairing. Proceedings of the IEEE Symposium on Security and Privacy.","journal-title":"J. Grossklags."},{"key":"e_1_2_1_9_1","unstructured":"P. Wang. 2014. \"Bluetooth Low Energy-privacy Enhancement for Advertisement.\" Master's thesis Norwegian University of Science and Technology."},{"volume-title":"Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks.","author":"Heinze D.","key":"e_1_2_1_10_1","unstructured":"D. Heinze, J. Classen, and F. Rohrbach. 2020. MagicPairing: Apple's take on securing bluetooth peripherals. Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks."},{"volume-title":"Proceedings of the USENIX Security Symposium.","author":"Ruge J.","key":"e_1_2_1_11_1","unstructured":"J. Ruge, J. Classen, F. Gringoli, and M. Hollick. 2020. Frankenstein: Advanced wireless fuzzing to exploit new bluetooth escalation targets. Proceedings of the USENIX Security Symposium."},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium.","author":"Naveed M.","key":"e_1_2_1_12_1","unstructured":"M. Naveed, X.-y. Zhou, S. Demetriou, X. Wang, and C.A. Gunter. 2014. Inside job: Understanding and mitigating the threat of external device mis-binding on Android. Proceedings of the Network and Distributed System Security Symposium."},{"volume-title":"Proceedings of the USENIX Security Symposium.","author":"Wu J.","key":"e_1_2_1_13_1","unstructured":"J. Wu, R. Wu, D. Antonioli, M. Payer, N. O. Tippenhauer, D. Xu, D. J. Tian, and A. Bianchi. 2021. LIGHTBLUE: Automatic profile-aware debloating of bluetooth stacks. Proceedings of the USENIX Security Symposium."},{"volume-title":"Proceedings of the USENIX Security Symposium.","author":"Antonioli D.","key":"e_1_2_1_14_1","unstructured":"D. Antonioli, N.O. Tippenhauer, and K. Rasmussen. 2019. The KNOB is broken: Exploiting low entropy in the encryption key negotiation of bluetooth BR\/EDR. Proceedings of the USENIX Security Symposium."}],"container-title":["GetMobile: Mobile Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733892.3733894","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3733892.3733894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:56Z","timestamp":1750298216000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733892.3733894"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,30]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,4,30]]}},"alternative-id":["10.1145\/3733892.3733894"],"URL":"https:\/\/doi.org\/10.1145\/3733892.3733894","relation":{},"ISSN":["2375-0529","2375-0537"],"issn-type":[{"type":"print","value":"2375-0529"},{"type":"electronic","value":"2375-0537"}],"subject":[],"published":{"date-parts":[[2025,4,30]]},"assertion":[{"value":"2025-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}