Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a 19-minute IEEE conference talk that delves into the formal model-driven discovery of Bluetooth protocol design vulnerabilities. Learn about key sharing, modular design, and Bluetooth coexistence as presented by researchers from Purdue University. Gain insights into the verification process, identified vulnerabilities, and limitations of the study. The presentation covers essential background knowledge, a literature review, and research objectives before diving into the technical aspects of Bluetooth protocol security. Conclude with a question-and-answer session to deepen your understanding of this critical area in wireless communication security.