YoVDO

Attacks on Wireless Coexistence

Offered By: IEEE via YouTube

Tags

Conference Talks Courses Wireless Security Courses

Course Description

Overview

Explore the vulnerabilities in wireless coexistence through this 15-minute IEEE conference talk. Delve into various attack vectors targeting wireless coexistence mechanisms, and examine the enhanced coexistence interface and Wlearn RAM sharing. Gain insights from experts Jiska Classen, Michael Hermann, Francesco Gringoli, and Matthias Hollick as they discuss coexistence interfaces and their implications for wireless security. Conclude with a comprehensive understanding of the challenges and potential solutions in maintaining secure wireless coexistence.

Syllabus

Introduction
Wireless coexistence attacks
Enhanced coexistence interface
Wlearn ram sharing
Coexistence interfaces
Conclusion


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube