Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities

IEEE via YouTube

Overview

Explore a 19-minute IEEE conference talk that delves into the formal model-driven discovery of Bluetooth protocol design vulnerabilities. Learn about key sharing, modular design, and Bluetooth coexistence as presented by researchers from Purdue University. Gain insights into the verification process, identified vulnerabilities, and limitations of the study. The presentation covers essential background knowledge, a literature review, and research objectives before diving into the technical aspects of Bluetooth protocol security. Conclude with a question-and-answer session to deepen your understanding of this critical area in wireless communication security.

Syllabus

Introduction
Background Knowledge
Literature Study
Objectives
Key Sharing
Modular Design
Bluetooth Coexistence
Verification
Vulnerabilities
Limitations
Questions

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.