Breaking Broadcast LE Audio Security: Vulnerabilities in Auracast Protocol
media.ccc.de via YouTube
Get 20% off all career paths from fullstack to AI
Learn EDR Internals: Research & Development From The Masters
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a detailed security analysis of Bluetooth's Auracast feature in this 41-minute conference talk from the 38th Chaos Communication Congress. Dive into the vulnerabilities of the new Bluetooth LE Broadcast Audio protocol, examining how both unencrypted and encrypted broadcasts can be compromised. Learn about the technical specifications of LE Audio introduced in Bluetooth 5.2, focusing on Broadcast Isochronous Streams (BIS) and their security implications. Discover how researchers Frieder Steinmetz and Dennis Heinze identified weaknesses in popular device implementations, demonstrating methods to breach authenticity and confidentiality of Auracast broadcasts. Get insights into their custom toolkit for brute-forcing authentication codes, decrypting streams, and hijacking encrypted broadcasts, highlighting the urgent need for improved security measures in this emerging technology.
Syllabus
38C3 pol - Auracast: Breaking Broadcast LE Audio Before It Hits the Shelves
Taught by
media.ccc.de