Attacking Bluetooth LE design and implementation in mobile + wearables ecosystems. Nitin Lakshmanan & Sunil Kumar
Paper abstract bibtex Consumer IoT devices manifest in a variety of forms today, including fitness trackers, rings, smart-watches, pacemakers, and so on. The wearable IoT market is dominated by small and medium-sized business, who are often in a rush to hit the shelves before their competitors, and trivialize the need for security in the bargain, citing no “return on investment”. **In our presentation, we deep-dive into the wireless protocol of choice for wearables — Bluetooth Low Energy (BLE), and its impact from a security perspective. We use a USB-based bluetooth hacking hardware board called Ubertooth-One to analyze popular market products, and also perform a live demo on stealing information from a fitness tracker using standard Android app development practices. We wrap up with a discussion on simple cryptographic approaches and BLE-hardening mechanisms to prevent such attacks on wearable and IoT platforms.
@misc{nitin_lakshmanan_attacking_nodate,
address = {Insomni'hack},
title = {Attacking {Bluetooth} {LE} design and implementation in mobile + wearables ecosystems},
url = {https://insomnihack.ch/talks-2022/#JZSBKN},
abstract = {Consumer IoT devices manifest in a variety of forms today, including fitness trackers, rings, smart-watches, pacemakers, and so on. The wearable IoT market is dominated by small and medium-sized business, who are often in a rush to hit the shelves before their competitors, and trivialize the need for security in the bargain, citing no “return on investment”. **In our presentation, we deep-dive into the wireless protocol of choice for wearables — Bluetooth Low Energy (BLE), and its impact from a security perspective. We use a USB-based bluetooth hacking hardware board called Ubertooth-One to analyze popular market products, and also perform a live demo on stealing information from a fitness tracker using standard Android app development practices. We wrap up with a discussion on simple cryptographic approaches and BLE-hardening mechanisms to prevent such attacks on wearable and IoT platforms.},
author = {{Nitin Lakshmanan} and {Sunil Kumar}},
}
Downloads: 0
{"_id":"W5Goz47ajXenfQyPa","bibbaseid":"nitinlakshmanan-sunilkumar-attackingbluetoothledesignandimplementationinmobilewearablesecosystems","author_short":["Nitin Lakshmanan","Sunil Kumar"],"bibdata":{"bibtype":"misc","type":"misc","address":"Insomni'hack","title":"Attacking Bluetooth LE design and implementation in mobile + wearables ecosystems","url":"https://insomnihack.ch/talks-2022/#JZSBKN","abstract":"Consumer IoT devices manifest in a variety of forms today, including fitness trackers, rings, smart-watches, pacemakers, and so on. The wearable IoT market is dominated by small and medium-sized business, who are often in a rush to hit the shelves before their competitors, and trivialize the need for security in the bargain, citing no “return on investment”. **In our presentation, we deep-dive into the wireless protocol of choice for wearables — Bluetooth Low Energy (BLE), and its impact from a security perspective. We use a USB-based bluetooth hacking hardware board called Ubertooth-One to analyze popular market products, and also perform a live demo on stealing information from a fitness tracker using standard Android app development practices. We wrap up with a discussion on simple cryptographic approaches and BLE-hardening mechanisms to prevent such attacks on wearable and IoT platforms.","author":[{"firstnames":[],"propositions":[],"lastnames":["Nitin Lakshmanan"],"suffixes":[]},{"firstnames":[],"propositions":[],"lastnames":["Sunil Kumar"],"suffixes":[]}],"bibtex":"@misc{nitin_lakshmanan_attacking_nodate,\n\taddress = {Insomni'hack},\n\ttitle = {Attacking {Bluetooth} {LE} design and implementation in mobile + wearables ecosystems},\n\turl = {https://insomnihack.ch/talks-2022/#JZSBKN},\n\tabstract = {Consumer IoT devices manifest in a variety of forms today, including fitness trackers, rings, smart-watches, pacemakers, and so on. The wearable IoT market is dominated by small and medium-sized business, who are often in a rush to hit the shelves before their competitors, and trivialize the need for security in the bargain, citing no “return on investment”. **In our presentation, we deep-dive into the wireless protocol of choice for wearables — Bluetooth Low Energy (BLE), and its impact from a security perspective. We use a USB-based bluetooth hacking hardware board called Ubertooth-One to analyze popular market products, and also perform a live demo on stealing information from a fitness tracker using standard Android app development practices. We wrap up with a discussion on simple cryptographic approaches and BLE-hardening mechanisms to prevent such attacks on wearable and IoT platforms.},\n\tauthor = {{Nitin Lakshmanan} and {Sunil Kumar}},\n}\n\n","author_short":["Nitin Lakshmanan","Sunil Kumar"],"key":"nitin_lakshmanan_attacking_nodate","id":"nitin_lakshmanan_attacking_nodate","bibbaseid":"nitinlakshmanan-sunilkumar-attackingbluetoothledesignandimplementationinmobilewearablesecosystems","role":"author","urls":{"Paper":"https://insomnihack.ch/talks-2022/#JZSBKN"},"metadata":{"authorlinks":{}},"html":""},"bibtype":"misc","biburl":"https://bibbase.org/network/files/KPvyuqsSSM9LXmmGy","dataSources":["L4wuGMBYhquxErcXE"],"keywords":[],"search_terms":["attacking","bluetooth","design","implementation","mobile","wearables","ecosystems","nitin lakshmanan","sunil kumar"],"title":"Attacking Bluetooth LE design and implementation in mobile + wearables ecosystems","year":null}