Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a detailed security analysis of Bluetooth's Auracast feature in this 41-minute conference talk from the 38th Chaos Communication Congress. Dive into the vulnerabilities of the new Bluetooth LE Broadcast Audio protocol, examining how both unencrypted and encrypted broadcasts can be compromised. Learn about the technical specifications of LE Audio introduced in Bluetooth 5.2, focusing on Broadcast Isochronous Streams (BIS) and their security implications. Discover how researchers Frieder Steinmetz and Dennis Heinze identified weaknesses in popular device implementations, demonstrating methods to breach authenticity and confidentiality of Auracast broadcasts. Get insights into their custom toolkit for brute-forcing authentication codes, decrypting streams, and hijacking encrypted broadcasts, highlighting the urgent need for improved security measures in this emerging technology.
Syllabus
38C3 pol - Auracast: Breaking Broadcast LE Audio Before It Hits the Shelves
Taught by
media.ccc.de