Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore critical security vulnerabilities discovered in Master Lock's D1000 smart deadbolt through comprehensive reverse engineering and protocol analysis. Learn how researchers from UC San Diego systematically analyzed the Master Lock Vault Enterprise Android app and uncovered multiple serious security flaws including replay attacks enabling unauthorized access, persistent access for expired guest users, malicious extension of temporary permissions, audit log manipulation capabilities, and Bluetooth Low Energy vulnerabilities causing denial of service attacks. Discover the methodology used to reverse engineer proprietary communication protocols, understand the development of proof-of-concept exploits through a custom Android application, and examine proposed countermeasures for these vulnerabilities. Gain insights into the broader security implications for smart locks and Internet of Things devices, understanding how seemingly secure smart home technologies can contain fundamental flaws that compromise user safety and privacy.
Syllabus
WOOT '25 - No Key, No Problem: Vulnerabilities in Master Lock Smart Locks
Taught by
USENIX