Bluetooth Vulnerability Research

This project took place in our second year of computer science studies, working alongside two classmates.

The goal was to study the ways that companies implemented the Bluetooth Low Energy protocol to find vulnerabilities.

This document serves as the final report on our project.

Bluetooth Vulnerabilities