Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a groundbreaking approach to Bluetooth security research in this 30-minute Black Hat conference talk that reveals previously overlooked vulnerabilities within Bluetooth protocol state machines. Discover how researchers from SouceGuard and Bytedance have identified a new attack surface by analyzing state machine mechanisms across various applications, including automotive and mobile devices, moving beyond traditional security issues like buffer overflows and malformed packet crashes. Learn systematic techniques for manipulating Bluetooth state machine interactions by breaking standard execution orders and reconfiguring protocol interaction states, creating novel pathways for vulnerability discovery. Understand why state machine-based vulnerabilities often evade detection due to their lack of visible logs or crash data, and gain insights into methods for discovering these elusive security flaws. Examine the complexities of state machine interactions among supported profiles within the Bluetooth protocol stack and assess their potential impact on the broader Bluetooth ecosystem, from personal gadgets to complex IoT and automotive systems.