Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Breaking Broadcast LE Audio Security: Vulnerabilities in Auracast Protocol

media.ccc.de via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a detailed security analysis of Bluetooth's Auracast feature in this 41-minute conference talk from the 38th Chaos Communication Congress. Dive into the vulnerabilities of the new Bluetooth LE Broadcast Audio protocol, examining how both unencrypted and encrypted broadcasts can be compromised. Learn about the technical specifications of LE Audio introduced in Bluetooth 5.2, focusing on Broadcast Isochronous Streams (BIS) and their security implications. Discover how researchers Frieder Steinmetz and Dennis Heinze identified weaknesses in popular device implementations, demonstrating methods to breach authenticity and confidentiality of Auracast broadcasts. Get insights into their custom toolkit for brute-forcing authentication codes, decrypting streams, and hijacking encrypted broadcasts, highlighting the urgent need for improved security measures in this emerging technology.

Syllabus

38C3 pol - Auracast: Breaking Broadcast LE Audio Before It Hits the Shelves

Taught by

media.ccc.de

Reviews

Start your review of Breaking Broadcast LE Audio Security: Vulnerabilities in Auracast Protocol

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.