Breaking Broadcast LE Audio Security - Auracast Protocol Analysis
media.ccc.de via YouTube
Learn the Skills Netflix, Meta, and Capital One Actually Hire For
MIT Sloan: Lead AI Adoption Across Your Organization — Not Just Pilot It
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a 41-minute conference talk from the 38th Chaos Communication Congress (38C3) that reveals critical security vulnerabilities in Bluetooth's new Auracast feature before its widespread implementation. Dive into the technical analysis of Broadcast Isochronous Streams (BIS) in Bluetooth LE Audio, where researchers demonstrate how both unencrypted and encrypted broadcasts can be compromised. Learn about the insufficient security properties of the protocol, methods to crack authentication codes, and techniques for hijacking encrypted broadcasts. Discover findings from a survey of real-world Auracast implementations showing weak default configurations that compromise both authenticity and confidentiality. Get introduced to a toolkit for dumping, decrypting, and hijacking encrypted Auracast streams, presented by security researchers Frieder Steinmetz and Dennis Heinze.
Syllabus
38C3 - Auracast: Breaking Broadcast LE Audio Before It Hits the Shelves
Taught by
media.ccc.de