Explore the intricacies of Bluetooth Smart technology in this Black Hat USA 2013 conference talk. Delve into the protocol's design, from the physical layer to the application layer, and understand its strengths in low-power device applications. Uncover the vulnerabilities in Bluetooth Smart's key exchange process through a live demonstration of sniffing and recovering encryption keys using open-source tools. Learn about the risks of passive eavesdropping and decryption of communications. Discover a backward-compatible solution implementing Elliptic Curve Diffie-Hellman for secure in-band key exchange. Gain insights into the protocol stack, hopping mechanisms, GATT services, and the Ubertooth block diagram. Examine the PHY and Link layers, explore Wireshark capabilities, and understand custom key exchange protocols. Discuss the importance of Secure Simple Pairing in Bluetooth Smart and its backward compatibility. Witness a practical demonstration and summary of the technology's capabilities, accompanied by an overview of relevant software tools.
Read more
Bluetooth Smart - The Good, The Bad, The Ugly, and The Fix