<p>This talk will discuss an implementation of a honeyclient framework for mobile devices. In wireless environments, honeypots typically mimic access points or a single protocol of a device. The authors implemented a framework that can simultaneously imitate the WiFi, Bluetooth, and GPS behavior of multiple instances of different devices. This talk focuses on the challenges associated with accurately pretending to be somebody you are not and how honeyclients can contribute to the future of mobile device security.
<p>K. Navas is a Cadet at the U.S. Military Academy</p>
<p>D. Brasefield is a Cadet at the U.S. Military Academy</p>
<p>N. Grunzweig is a Cadet at the U.S. Military Academy</p>
<p>T. OConnor is a Faculty Advisor at the U.S. Military Academy</p><p>The members of the above team are all cadets and faculty at the United States Military Academy, wherein addition to studying wireless and mobile security they enjoy pulling guard duty, seeing who cancount to the highest prime number, and building cow-patty tables of their favorite instructor's SSIDs.They are all one year from graduating the military academy and joining the fighting force.</p>