Overview
Syllabus
Intro
Acknowledgements
Software Defined Radio
Wireless in 2018
Embedded == Design by Compromise
IP Network Sniffing is Easy
Wireless Network Sniffing is Hard
Prototype Integrated Designs
Design Optimization
Offensive Security Research
RF Fuzzing
Defensive Security Applications
RF vs. Wired: Defining Attributes
Promiscuity Makes Recon Easy
Promiscuity and Attribution
Siren Jack
Dallas Tornado Siren Attack Demo
St. Jude / Abbott Pacemaker Attack
BlueBorne
Wireless lot Worms (1/2)
Physical Layer State Machine Attacks
Physical Layer State Machine Attack Demo
Chipset Fuzzing with TumbleRF
Conclusions
Intro
Taught by
RSA Conference