Attacking Wearable Device Communication over BLE - When Encryption Is Not Enough
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore a conference talk from AppSecUSA 2016 that delves into the security vulnerabilities of Bluetooth Low Energy (BLE) communication between wearable devices and mobile applications. Learn about the insufficiencies of BLE encryption protocols and how rogue mobile apps can exploit these weaknesses to access personal information or cause denial of service conditions on wearables. Discover high-level flows for designing secure communication channels between phone applications and wearable devices. Gain insights from security experts Chandra Prakash Gopalaiah, Sumanth Naropanth, and Kavya Racharla as they discuss case studies, security assumptions made by popular mobile operating systems, and the need for additional security measures in BLE communication.
Syllabus
When encryption is not enough: Attacking Wearable - AppSecUSA 2016
Taught by
OWASP Foundation
Related Courses
MongoDB for .NET DevelopersMongoDB University Web Application Development – Capstone Course
University of New Mexico via Coursera Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent Reliable Cloud Infrastructure: Design and Process auf Deutsch
Google Cloud via Coursera Securing and Integrating Components of your Application 日本語版
Google Cloud via Coursera