Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Breaking Broadcast LE Audio Security: Vulnerabilities in Auracast Protocol

media.ccc.de via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a 41-minute conference talk from the 38th Chaos Communication Congress (38C3) that reveals critical security vulnerabilities in Bluetooth's new Auracast feature before its widespread implementation. Dive deep into the technical analysis of Broadcast Isochronous Streams (BIS) in Bluetooth LE Audio, where researchers demonstrate how both unencrypted and encrypted broadcasts can be compromised. Learn about the insufficient security properties of the protocol, including methods to crack authentication codes and hijack encrypted broadcasts. Discover findings from a survey of real-world Auracast implementations showing weak default configurations that compromise both authenticity and confidentiality. Get introduced to a toolkit for dumping, decrypting, and hijacking encrypted Auracast broadcasts, presented by security researchers Frieder Steinmetz and Dennis Heinze. Understand the implications of these security flaws in the context of Bluetooth 5.2's LE Audio features, which are designed for improved sound quality and battery life in devices like headphones, earbuds, and hearing aids.

Syllabus

38C3 deu - Auracast: Breaking Broadcast LE Audio Before It Hits the Shelves

Taught by

media.ccc.de

Reviews

Start your review of Breaking Broadcast LE Audio Security: Vulnerabilities in Auracast Protocol

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.