Overview
Explore the vulnerabilities in wireless coexistence through this 15-minute IEEE conference talk. Delve into various attack vectors targeting wireless coexistence mechanisms, and examine the enhanced coexistence interface and Wlearn RAM sharing. Gain insights from experts Jiska Classen, Michael Hermann, Francesco Gringoli, and Matthias Hollick as they discuss coexistence interfaces and their implications for wireless security. Conclude with a comprehensive understanding of the challenges and potential solutions in maintaining secure wireless coexistence.
Syllabus
Introduction
Wireless coexistence attacks
Enhanced coexistence interface
Wlearn ram sharing
Coexistence interfaces
Conclusion
Taught by
IEEE Symposium on Security and Privacy