Bluetooth - Does It Spark Joy?
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore the intricacies of Bluetooth firmware reverse engineering in this 55-minute conference talk. Delve into the security implications of dissecting firmware, gain insights into the platform overview, and learn about Internal Blue. Discover techniques for reverse engineering with and without symbols, and understand the Broadcom Diagnostics Protocol. Examine the Fixed-coordinate Invalid Curve Attack and test mode execution. Gain knowledge about bug-finding toolchains and their applications in Bluetooth security analysis.
Syllabus
Bluetooth, does it spark joy?
Reverse engineering Bluetooth firmware - why?! . Dissecting firmware glves interesting insights on a security perspective
Platform Overview
Internal Blue
Reversing ...
Reverse engineering without symbols
Reverse engineering with symbols
Broadcom Diagnostics Protocol
Fixed-coordinate Invalid Curve Attack
Test mode execution
Bug finding toolchain
Taught by
WEareTROOPERS
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network