Dark Mentor LLC
Dark Mentor LLC
Home
Training
Publications
Bluetooth Security Timeline
PC/Server Firmware Security Timeline
Remote Code Execution
Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares
Bluetooth Low Energy (BLE) has seen widespread product adoption and a renewed interest from a security community whose interest in …
Veronica Kovah
Cite
Slides (PDF)
Whitepaper (PDF)
PoC Exploit Code
Conference Presentation Video
Cite
×