Attacking Bluetooth LE design and implementation in mobile + wearables ecosystems. Nitin Lakshmanan & Sunil Kumar
Attacking Bluetooth LE design and implementation in mobile + wearables ecosystems [link]Paper  abstract   bibtex   
Consumer IoT devices manifest in a variety of forms today, including fitness trackers, rings, smart-watches, pacemakers, and so on. The wearable IoT market is dominated by small and medium-sized business, who are often in a rush to hit the shelves before their competitors, and trivialize the need for security in the bargain, citing no “return on investment”. **In our presentation, we deep-dive into the wireless protocol of choice for wearables — Bluetooth Low Energy (BLE), and its impact from a security perspective. We use a USB-based bluetooth hacking hardware board called Ubertooth-One to analyze popular market products, and also perform a live demo on stealing information from a fitness tracker using standard Android app development practices. We wrap up with a discussion on simple cryptographic approaches and BLE-hardening mechanisms to prevent such attacks on wearable and IoT platforms.
@misc{nitin_lakshmanan_attacking_nodate,
	address = {Insomni'hack},
	title = {Attacking {Bluetooth} {LE} design and implementation in mobile + wearables ecosystems},
	url = {https://insomnihack.ch/talks-2022/#JZSBKN},
	abstract = {Consumer IoT devices manifest in a variety of forms today, including fitness trackers, rings, smart-watches, pacemakers, and so on. The wearable IoT market is dominated by small and medium-sized business, who are often in a rush to hit the shelves before their competitors, and trivialize the need for security in the bargain, citing no “return on investment”. **In our presentation, we deep-dive into the wireless protocol of choice for wearables — Bluetooth Low Energy (BLE), and its impact from a security perspective. We use a USB-based bluetooth hacking hardware board called Ubertooth-One to analyze popular market products, and also perform a live demo on stealing information from a fitness tracker using standard Android app development practices. We wrap up with a discussion on simple cryptographic approaches and BLE-hardening mechanisms to prevent such attacks on wearable and IoT platforms.},
	author = {{Nitin Lakshmanan} and {Sunil Kumar}},
}

Downloads: 0