YoVDO

Zeroconf Protocols and Their Numerous Man in the Middle Attacks

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Cybersecurity Courses Network Security Courses Man in The Middle Attacks Courses Vulnerability Assessment Courses Threat Mitigation Courses

Course Description

Overview

Explore the vulnerabilities of Zeroconf protocols and their susceptibility to man-in-the-middle attacks in this 15-minute IEEE conference talk presented at the 15th IEEE Workshop on Offensive Technologies. Gain insights from authors Marc Dacier and Dhia Farrah of EURECOM as they delve into the security implications of zero-configuration networking protocols and discuss potential attack vectors that cybersecurity professionals should be aware of.

Syllabus

[WOOT2021] Zeroconf protocols and their numerous man in the middle attacks


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Sensor Security
IEEE via YouTube
Tracking Ransomware End-to-end
IEEE via YouTube
Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
IEEE via YouTube
Algorithmic Transparency via Quantitative Input Influence - Theory and Experiments with Learning Systems
IEEE via YouTube
Bitcoin Over Tor Isn't a Good Idea
IEEE via YouTube