BISON: Attacking Bluetooth's Broadcast Isochronous Streams

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

In this paper we present BISON, a novel attack on Bluetooth’s broadcast isochronous streams (BISes), and demonstrate it on off-the-shelf hardware. BISON exploits the plaintext metadata used for stream synchronization as well as the vague specification of the Broadcast_Code exchange to take over ongoing BISes and manipulate their content. With BISON, we are the first to raise awareness about the vulnerability of BISes, which are the stepping stone of several Bluetooth applications for audio diffusion at public locations. We further describe possible attack countermeasures and guidelines on how to design secure applications leveraging BISes
Original languageEnglish
Title of host publicationEWSN '23: Proceedings of the 2023 International Conference on embedded Wireless Systems and Networks
Place of PublicationNew York, NY
PublisherAssociation of Computing Machinery
Pages256-261
DOIs
Publication statusPublished - 25 Sept 2023
Event20th International Conference on Embedded Wireless Systems and Networks: EWSN 2023 - University of Calabria, Rende, Italy
Duration: 25 Sept 202327 Sept 2023
https://events.dimes.unical.it/ewsn2023/

Conference

Conference20th International Conference on Embedded Wireless Systems and Networks
Abbreviated titleEWSN 2023
Country/TerritoryItaly
CityRende
Period25/09/2327/09/23
Internet address

Fields of Expertise

  • Information, Communication & Computing

Fingerprint

Dive into the research topics of 'BISON: Attacking Bluetooth's Broadcast Isochronous Streams'. Together they form a unique fingerprint.

Cite this