YoVDO

BlueMirror - Reflections on Bluetooth Pairing and Provisioning Protocols

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Cybersecurity Courses Network Engineering Courses Vulnerability Assessment Courses Bluetooth Security Courses

Course Description

Overview

Explore the intricacies of Bluetooth pairing and provisioning protocols in this 21-minute conference talk from the 15th IEEE Workshop on Offensive Technologies. Delve into the research presented by Tristan Claverie and José Lopes Esteves from ANSSI, titled "BlueMirror: Reflections on Bluetooth Pairing and Provisioning Protocols." Gain insights into potential vulnerabilities and security considerations in Bluetooth technology, with a focus on the pairing and provisioning processes. Learn about the methodologies and tools used in the study, including the application of tshark for packet capture analysis. Enhance your understanding of wireless security and the challenges faced in ensuring secure Bluetooth connections in various devices and applications.

Syllabus

[WOOT2021] BlueMirror: Reflections on Bluetooth Pairing and Provisioning Protocols


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Sensor Security
IEEE via YouTube
Tracking Ransomware End-to-end
IEEE via YouTube
Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
IEEE via YouTube
Algorithmic Transparency via Quantitative Input Influence - Theory and Experiments with Learning Systems
IEEE via YouTube
Bitcoin Over Tor Isn't a Good Idea
IEEE via YouTube