Grand Theft House: RF Lock Pick Tool to Unlock Smart Door Lock
Recently, many people have installed smart door locks in their homes and offices, as a way to maximize convenience and security. The wireless link provides a simple and convenient connection to the doorlock from anywhere in the IoT-covered area. As RF wireless technology makes our lives more convenient, there have been a lot of security threats and the resulting enhancement in the past decade. The threats remain clearly unresolved due to the vendor's lack of insight into the proprietary RF protocol security.
We will provide an in-depth analysis of the implementation of smart door locks and their vulnerabilities on secure rolling code algorithms which use advanced encryption standard (AES) and its cipher-based message for RF transmitter authentication....
By: Seokhie Hong , Kwonyoup Kim , Seungjoon Lee
Full Abstract and Presentation Materials: https://www.blackhat.com/asia-23/briefings/schedule/#grand-theft-house-rf-lock-pick-tool-to-unlock-smart-door-lock-30801
Видео Grand Theft House: RF Lock Pick Tool to Unlock Smart Door Lock канала Black Hat
We will provide an in-depth analysis of the implementation of smart door locks and their vulnerabilities on secure rolling code algorithms which use advanced encryption standard (AES) and its cipher-based message for RF transmitter authentication....
By: Seokhie Hong , Kwonyoup Kim , Seungjoon Lee
Full Abstract and Presentation Materials: https://www.blackhat.com/asia-23/briefings/schedule/#grand-theft-house-rf-lock-pick-tool-to-unlock-smart-door-lock-30801
Видео Grand Theft House: RF Lock Pick Tool to Unlock Smart Door Lock канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Hacked on National Television](https://i.ytimg.com/vi/_4GBTTP9g3U/default.jpg)
![Fuzzing the Native NTFS Read-Write Driver (NTFS3) in the Linux Kernel](https://i.ytimg.com/vi/n62uFd47F30/default.jpg)
![Forward Focus – The Impact of Artificial Intelligence](https://i.ytimg.com/vi/A7FxxuHV0Jk/default.jpg)
![firmWar: An Imminent Threat to the Foundation of Computing](https://i.ytimg.com/vi/io2MCK3M_pw/default.jpg)
![Fireside Chat: Jeff Moss and Gaurav Keerthi](https://i.ytimg.com/vi/ifA3kLv6D2c/default.jpg)
![Scammers Who Scam Scammers, Hackers Who Hack Hackers: Exploring a Sub-economy on Cybercrime Forums](https://i.ytimg.com/vi/5bNQnNdZeb0/default.jpg)
![Ret2page: The Art of Exploiting Use-After-Free Vulnerabilities in the Dedicated Cache](https://i.ytimg.com/vi/HZk2egYDXxg/default.jpg)
![Attack on Titan M, Reloaded: Vulnerability Research on a Modern Security Chip](https://i.ytimg.com/vi/bCjkAkXiwK4/default.jpg)
![AEPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture](https://i.ytimg.com/vi/8ZWc7Hcsl8o/default.jpg)
![Attacks From a New Front Door in 4G & 5G Mobile Networks](https://i.ytimg.com/vi/XzvWguiFPX8/default.jpg)
![Android Universal Root: Exploiting Mobile GPU / Command Queue Drivers](https://i.ytimg.com/vi/kEl5qbLZVeY/default.jpg)
![AAD Joined Machines - The New Lateral Movement](https://i.ytimg.com/vi/ZPI2OB0g028/default.jpg)
![A Journey Into Fuzzing WebAssembly Virtual Machines](https://i.ytimg.com/vi/V3a5asx9aLQ/default.jpg)
![A New Trend for the Blue Team: Using a Symbolic Engine to Detect Evasive Forms of Malware/Ransomware](https://i.ytimg.com/vi/CIjzABWO3DY/default.jpg)
![Monitoring Surveillance Vendors: A Deep Dive into In-the-Wild Android Full Chains in 2021](https://i.ytimg.com/vi/0Vv5kLj0tz4/default.jpg)
![New Memory Forensics Techniques to Defeat Device Monitoring Malware](https://i.ytimg.com/vi/Qgu5CGV-4JY/default.jpg)
![The 8th Annual Black Hat USA NOC Report](https://i.ytimg.com/vi/ABUC7ZGB1Ok/default.jpg)
![Better Privacy Through Offense: How To Build a Privacy Red Team](https://i.ytimg.com/vi/WJXjl8vk_nM/default.jpg)
![Unlimited Results: Breaking Firmware Encryption of ESP32-V3](https://i.ytimg.com/vi/wfZHQocTsZo/default.jpg)
![Backdooring and Hijacking Azure AD Accounts by Abusing External Identities](https://i.ytimg.com/vi/uKDS2t9_KsA/default.jpg)