Bluetooth Low Energy Security Testing with Combinatorial Methods

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Wireless protocols such as Bluetooth Low Energy (BLE) play a vital role in ubiquitous computing and Internet of Things (IoT) devices. Numerous vulnerabilities in a variety of devices and components of the BLE stack have been uncovered in recent years, potentially affecting millions of customers. Being notoriously difficult to test due to the level of abstraction commonly enforced by the Host Controller Interface (HCI), a recent work successfully implements a fuzzing framework utilizing a custom firmware for a BLE device. However, fuzzing is inherently probabilistic, which may lead to faults remaining undiscovered. In this work, we enhance the aforementioned method with a Combinatorial Security Testing (CST) approach that provides a guaranteed degree of input space coverage. Through an evaluation targeting 10 BLE devices and a variety of firmware versions, we identify a total of 19 distinct issues, replicating findings of the previous work and uncovering additional faults. We additionally provide a performance overview of our tool and the original fuzzer, comparing their execution time and fault detection capabilities.
Original languageEnglish
Title of host publicationUSENIX ATC '25: Proceedings of the 2025 USENIX Conference on Usenix Annual Technical Conference
PublisherUSENIX Association
Pages1625-1638
Number of pages14
ISBN (Electronic)978-1-939133-48-9
Publication statusPublished - Sept 2025
EventUSENIX ATC '25: 2025 USENIX Conference on Usenix Annual Technical Conference - Boston, United States
Duration: 7 Jul 20259 Jul 2025

Conference

ConferenceUSENIX ATC '25: 2025 USENIX Conference on Usenix Annual Technical Conference
Abbreviated titleUSENIX ATC '25
Country/TerritoryUnited States
CityBoston
Period7/07/259/07/25

Classification according to Österreichische Systematik der Wissenschaftszweige (ÖFOS 2012)

  • Not applicable

Applied Research Level (ARL)

  • Not applicable

Research focus/foci

  • Not applicable

Fingerprint

Dive into the research topics of 'Bluetooth Low Energy Security Testing with Combinatorial Methods'. Together they form a unique fingerprint.

Cite this