BrokenMesh: New Attack Surfaces of Bluetooth Mesh
....In this talk, we will first introduce the background of Bluetooth Mesh. Then, we analyze the network build and network control protocols, illustrate the attack surfaces in their implementation and wrapper application. Next, we will share the design of BLE Mesh Fuzzer. And finally, we explain the causes of vulnerabilities through several real cases, and put forward our safety recommendations.
By: Dongxiang Ke , Lewei Qu , Han Yan
Full Abstract & Presentation Materials: https://www.blackhat.com/us-22/briefings/schedule/#brokenmesh-new-attack-surfaces-of-bluetooth-mesh-26853
Видео BrokenMesh: New Attack Surfaces of Bluetooth Mesh канала Black Hat
By: Dongxiang Ke , Lewei Qu , Han Yan
Full Abstract & Presentation Materials: https://www.blackhat.com/us-22/briefings/schedule/#brokenmesh-new-attack-surfaces-of-bluetooth-mesh-26853
Видео BrokenMesh: New Attack Surfaces of Bluetooth Mesh канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![The Discovery of a Government Malware and an Unexpected Spy Scandal](https://i.ytimg.com/vi/M5TsAQ59lMM/default.jpg)
![Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation](https://i.ytimg.com/vi/MRku-2fW42w/default.jpg)
![iOS Kernel PAC, One Year Later](https://i.ytimg.com/vi/7zCBOFxATFs/default.jpg)
![Come to the Dark Side, We Have Apples: Turning macOS Management Evil](https://i.ytimg.com/vi/pOQOh07eMxY/default.jpg)
![Beyond Root: Custom Firmware for Embedded Mobile Chipsets](https://i.ytimg.com/vi/5mRbq0d2Nss/default.jpg)
![hAFL1: Our Journey of Fuzzing Hyper-V and Discovering a 0-Day](https://i.ytimg.com/vi/ALcm6pmR8ck/default.jpg)
![RCE-as-a-Service: Lessons Learned from 5 Years of Real-World CI/CD Pipeline Compromise](https://i.ytimg.com/vi/Pe9nJLZvABM/default.jpg)
![Patching Loopholes: Finding Backdoors in Applications](https://i.ytimg.com/vi/KY3ESomgmtI/default.jpg)
![Rope: Bypassing Behavioral Detection of Malware with Distributed ROP-Driven Execution](https://i.ytimg.com/vi/PBDHhOtc0zM/default.jpg)
![Escaping Virtualized Containers](https://i.ytimg.com/vi/0hrv0qyOEd0/default.jpg)
![Portable Data exFiltration: XSS for PDFs](https://i.ytimg.com/vi/kMirO25kulw/default.jpg)
![Wi-Fi Brokering](https://i.ytimg.com/vi/XYgBw8mx9Jw/default.jpg)
![My Cloud is APT's Cloud: Investigating and Defending Office 365](https://i.ytimg.com/vi/ia0T8i7LAAI/default.jpg)
![Attack on Titan M, Reloaded: Vulnerability Research on a Modern Security Chip](https://i.ytimg.com/vi/bCjkAkXiwK4/default.jpg)
![IMP4GT: IMPersonation Attacks in 4G NeTworks](https://i.ytimg.com/vi/VzWsLmVDqZc/default.jpg)
![The B-MAD Approach to Threat Modeling](https://i.ytimg.com/vi/N5icvgTyg7k/default.jpg)
![Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature](https://i.ytimg.com/vi/IO5iBSV1VpE/default.jpg)
![Hacking a Capsule Hotel - Ghost in the Bedrooms](https://i.ytimg.com/vi/oO-WFAIK01s/default.jpg)
![Breaking Firmware Trust From Pre-EFI: Exploiting Early Boot Phases](https://i.ytimg.com/vi/Z81s7UIiwmI/default.jpg)
![ProxyLogon is Just the Tip of the Iceberg: A New Attack Surface on Microsoft Exchange Server!](https://i.ytimg.com/vi/SmTW_cGbveM/default.jpg)
![Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets](https://i.ytimg.com/vi/0Okqvm4lBQI/default.jpg)