Explore a 19-minute IEEE conference talk that delves into the formal model-driven discovery of Bluetooth protocol design vulnerabilities. Learn about key sharing, modular design, and Bluetooth coexistence as presented by researchers from Purdue University. Gain insights into the verification process, identified vulnerabilities, and limitations of the study. The presentation covers essential background knowledge, a literature review, and research objectives before diving into the technical aspects of Bluetooth protocol security. Conclude with a question-and-answer session to deepen your understanding of this critical area in wireless communication security.
Overview
Syllabus
Introduction
Background Knowledge
Literature Study
Objectives
Key Sharing
Modular Design
Bluetooth Coexistence
Verification
Vulnerabilities
Limitations
Questions
Taught by
IEEE Symposium on Security and Privacy