YoVDO

UWB Real Time Locating Systems - How Secure Radio Communications May Fail in Practice

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Network Traffic Analysis Courses Contact Tracing Courses Security Vulnerabilities Courses

Course Description

Overview

Explore how attackers can exploit Ultra-Wideband (UWB) Real-Time Locating Systems (RTLS) to compromise security and privacy in this 36-minute Black Hat conference presentation. Discover vulnerabilities in RTLS that enable malicious actors to locate and target individuals, bypass safety geofencing protocols, and interfere with contact tracing efforts. Delve into the technical aspects of UWB RTLS, including packet taxonomy, network traffic analysis, and packet dissection. Learn about passive eavesdropping and active traffic manipulation attacks, as well as their potential impact on various applications such as contact tracing, geofencing, and intrusion detection systems. Gain insights into crucial mitigation strategies, including traffic encryption and improved security considerations, to protect UWB RTLS from cyber threats. Presented by Andrea Palanca, Luca Cremona, and Roya Gordon, this talk provides a comprehensive overview of the security challenges facing UWB RTLS and offers practical solutions for enhancing their resilience against potential attacks.

Syllabus

Intro
Introduction - Cont'd
Motivation
Industry Scope
Analyzed Solutions
Technical Scope
Packet Taxonomy
Network Traffic
Packet Dissection
Security Considerations
Anchor Coordinates Prerequisite - Cont'd
Traffic Interception - Cont'd
Passive Eavesdropping Attacks
Active Traffic Manipulation Attacks - Cont'd
Contact Tracing
Geofencing
Segregation and Firewall Rules
Intrusion Detection Systems
Traffic Encryption
Summary
Black Hat Sound Bytes


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube