Главная
Study mode:
on
1
Bluetooth, does it spark joy?
2
Reverse engineering Bluetooth firmware - why?! . Dissecting firmware glves interesting insights on a security perspective
3
Platform Overview
4
Internal Blue
5
Reversing ...
6
Reverse engineering without symbols
7
Reverse engineering with symbols
8
Broadcom Diagnostics Protocol
9
Fixed-coordinate Invalid Curve Attack
10
Test mode execution
11
Bug finding toolchain
Description:
Explore the intricacies of Bluetooth firmware reverse engineering in this 55-minute conference talk. Delve into the security implications of dissecting firmware, gain insights into the platform overview, and learn about Internal Blue. Discover techniques for reverse engineering with and without symbols, and understand the Broadcom Diagnostics Protocol. Examine the Fixed-coordinate Invalid Curve Attack and test mode execution. Gain knowledge about bug-finding toolchains and their applications in Bluetooth security analysis.

Bluetooth - Does It Spark Joy?

WEareTROOPERS
Add to list
0:00 / 0:00