Переглядів 2,345
E.T.C. 001 Bluetooth Low Energy Vulnerabilities
Less quick explanation on Bluetooth Low Energy vulnerabilities based on this paper:
arxiv.org/abs/1908.10497
Chapters:
0:00 Introduction
0:11 Bluetooth Classic vs Bluetooth Low Energy (BLE)
1:21 BLE Pairing Process
4:05 BLE Communication Example
5:15 BLE Security Analysis
5:59 BLE Design Flaws
7:44 BLE Attack #1
11:01 BLE Attack #2
13:44 Android vs iOS on BLE Vulnerabilities
14:31 BLE Design Flaw Countermeasures
16:05 BLE Countermeasure #1
17:13 BLE Countermeasure #2
18:19 Summary