The repository contain code for Android attack apps we have written for our NDSS 2014 paper. Link to paper: http://www.internetsociety.org/doc/inside-job-understanding-and-mitigating-threat-external-device-mis-bonding-android
Data Stealing Attacks: The data stealing attack app need device specific code to parse the messages, therefore it has seperate code for all four devices we used in our study.
Data Injection Attacks: The variables (e.g. Bluetooth MAC address of the device or pin code of the device) in data injection attack app varies depending upon on the device. So, these things need to be adjusted according to the devices in hand.
Muhammad Naveed (http://cryptoonline.com), University of Illinois at Urbana-Champaign
Xiaoyong Zhou, Indiana University at Bloomington
Soteris Demetriou (http://soterisdemetriou.com/), University of Illinois at Urbana-Champaign
XiaoFeng Wang, Indiana University at Bloomington
Carl A. Gunter, University of Illinois at Urbana-Champaign