YoVDO

Attacking Wearable Device Communication over BLE - When Encryption Is Not Enough

Offered By: OWASP Foundation via YouTube

Tags

Bluetooth Low Energy Courses Internet of Things Courses Cybersecurity Courses Encryption Courses Application Security Courses Network Protocols Courses Wireless Communications Courses Vulnerability Assessment Courses Mobile Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk from AppSecUSA 2016 that delves into the security vulnerabilities of Bluetooth Low Energy (BLE) communication between wearable devices and mobile applications. Learn about the insufficiencies of BLE encryption protocols and how rogue mobile apps can exploit these weaknesses to access personal information or cause denial of service conditions on wearables. Discover high-level flows for designing secure communication channels between phone applications and wearable devices. Gain insights from security experts Chandra Prakash Gopalaiah, Sumanth Naropanth, and Kavya Racharla as they discuss case studies, security assumptions made by popular mobile operating systems, and the need for additional security measures in BLE communication.

Syllabus

When encryption is not enough: Attacking Wearable - AppSecUSA 2016


Taught by

OWASP Foundation

Related Courses

Bluetooth Low Energy (BLE) From Ground Up™
Udemy
Building More Reliable Bluetooth LE Products With Memfault
Nordic Semiconductor via YouTube
Getting Started with ANT for NRF Connect SDK
Nordic Semiconductor via YouTube
Introducing ANT Support to the NRF5340 SoC and NRF Connect SDK
Nordic Semiconductor via YouTube
Introduction to the NRF21540 RF FEM for Range Extension
Nordic Semiconductor via YouTube