Rethinking the Security and Privacy of Bluetooth Low Energy - Zhiqiang Lin

  Рет қаралды 376

Johns Hopkins Whiting School of Engineering

Johns Hopkins Whiting School of Engineering

Күн бұрын

Gerald M. Masson Distinguished Lecture Series
May 2, 2024
“Rethinking the Security and Privacy of Bluetooth Low Energy”
Zhiqiang Lin, Ohio State University
Bluetooth Low Energy (BLE) stands at the forefront of near-range wireless communication technology, integral to a myriad of Internet of Things devices (spanning health care, fitness, wearables, and smart home applications), primarily due to its significantly low energy consumption. However, the past few years have unveiled numerous security flaws, placing billions of Bluetooth devices at risk. While luckily these flaws have been discovered (some of which have been fixed), there is no reason to believe that current BLE protocols and implementations are free from other flaws. In this talk, Zhiqiang Lin will present a line of recent efforts aimed at enhancing BLE security and privacy. In particular, he will first present the protocol-level downgrade attack, an attack that can force the secure BLE channels into insecure ones to break the data integrity and confidentiality of BLE traffic. Then, he will introduce the Bluetooth Address Tracking (BAT) attack, a novel protocol-level attack, which can track randomized Bluetooth MAC addresses by using an innovative allowlist-based side channel. Next, he will talk about the lessons learned, root causes of the attacks, and their countermeasures. Finally, he will conclude his talk by discussing future directions in Bluetooth security and privacy.
Zhiqiang Lin is a Distinguished Professor of Engineering at the Ohio State University. His research interests center around systems and software security, with a key focus on (1) developing automated binary analysis techniques for vulnerability discovery and malware analysis, (2) hardening the systems and software from binary code rewriting, virtualization, and trusted execution environment, and (3) the applications of these techniques in mobile, Internet of Things, Bluetooth, and connected and autonomous vehicles. Lin has published over 150 papers, many of which appeared in the top venues in cybersecurity. He is an Institute of Electrical and Electronics Engineers Fellow, an ACM Distinguished Member, and a a recipient of the Harrison Faculty Award for Excellence in Engineering Education, an NSF CAREER Award, an Air Force Office of Scientific Research Young Investigator Award, and an Outstanding Faculty Teaching Award. He received his PhD in computer science from Purdue University.

Пікірлер: 1
Structured World Models for Robots - Krishna Murthy
2:02:13
Johns Hopkins Whiting School of Engineering
Рет қаралды 393
Hardware-Aware Efficient Primitives for Machine Learning - Dan Fu
1:02:47
Johns Hopkins Whiting School of Engineering
Рет қаралды 178
Do you choose Inside Out 2 or The Amazing World of Gumball? 🤔
00:19
pumpkins #shorts
00:39
Mr DegrEE
Рет қаралды 74 МЛН
когда не обедаешь в школе // EVA mash
00:51
EVA mash
Рет қаралды 4,1 МЛН
Офицер, я всё объясню
01:00
История одного вокалиста
Рет қаралды 6 МЛН
What Is Vulnerability Management? (Explained By Experts)
16:39
OSU Physics - 2019 Smith Lecture - Steven Chu
1:31:16
The Ohio State University - Department of Physics
Рет қаралды 1 М.
Cybersecurity Architecture: Networks
27:31
IBM Technology
Рет қаралды 127 М.
Robot Navigation in Complex Indoor and Outdoor Environments - Dinesh Manocha
1:05:21
Johns Hopkins Whiting School of Engineering
Рет қаралды 62
Is Skynet watching you already?
1:04:00
David Bombal
Рет қаралды 1,1 МЛН
Think Fast, Talk Smart: Communication Techniques
58:20
Stanford Graduate School of Business
Рет қаралды 40 МЛН
ASC Science Sundays: Robert M. Hazen - The Story of Earth: How Life and Rocks Have Co-Evolved
58:14
The Ohio State University College of Arts and Sciences
Рет қаралды 5 М.
Securing Your IoT Devices
13:55
IBM Technology
Рет қаралды 33 М.
Do you choose Inside Out 2 or The Amazing World of Gumball? 🤔
00:19