UWB Real Time Locating Systems - How Secure Radio Communications May Fail in Practice
Offered By: Black Hat via YouTube
Course Description
Overview
Explore how attackers can exploit Ultra-Wideband (UWB) Real-Time Locating Systems (RTLS) to compromise security and privacy in this 36-minute Black Hat conference presentation. Discover vulnerabilities in RTLS that enable malicious actors to locate and target individuals, bypass safety geofencing protocols, and interfere with contact tracing efforts. Delve into the technical aspects of UWB RTLS, including packet taxonomy, network traffic analysis, and packet dissection. Learn about passive eavesdropping and active traffic manipulation attacks, as well as their potential impact on various applications such as contact tracing, geofencing, and intrusion detection systems. Gain insights into crucial mitigation strategies, including traffic encryption and improved security considerations, to protect UWB RTLS from cyber threats. Presented by Andrea Palanca, Luca Cremona, and Roya Gordon, this talk provides a comprehensive overview of the security challenges facing UWB RTLS and offers practical solutions for enhancing their resilience against potential attacks.
Syllabus
Intro
Introduction - Cont'd
Motivation
Industry Scope
Analyzed Solutions
Technical Scope
Packet Taxonomy
Network Traffic
Packet Dissection
Security Considerations
Anchor Coordinates Prerequisite - Cont'd
Traffic Interception - Cont'd
Passive Eavesdropping Attacks
Active Traffic Manipulation Attacks - Cont'd
Contact Tracing
Geofencing
Segregation and Firewall Rules
Intrusion Detection Systems
Traffic Encryption
Summary
Black Hat Sound Bytes
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube