Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

State Manipulation - Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine Reconfiguration

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a groundbreaking approach to Bluetooth security research in this 30-minute Black Hat conference talk that reveals previously overlooked vulnerabilities within Bluetooth protocol state machines. Discover how researchers from SouceGuard and Bytedance have identified a new attack surface by analyzing state machine mechanisms across various applications, including automotive and mobile devices, moving beyond traditional security issues like buffer overflows and malformed packet crashes. Learn systematic techniques for manipulating Bluetooth state machine interactions by breaking standard execution orders and reconfiguring protocol interaction states, creating novel pathways for vulnerability discovery. Understand why state machine-based vulnerabilities often evade detection due to their lack of visible logs or crash data, and gain insights into methods for discovering these elusive security flaws. Examine the complexities of state machine interactions among supported profiles within the Bluetooth protocol stack and assess their potential impact on the broader Bluetooth ecosystem, from personal gadgets to complex IoT and automotive systems.

Syllabus

Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine

Taught by

Black Hat

Reviews

Start your review of State Manipulation - Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine Reconfiguration

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.