paint-brush
Bluetooth Hacking: Cheating in Elliptic Curve Billiardsby@TalBeerySec
2,949 reads
2,949 reads

Bluetooth Hacking: Cheating in Elliptic Curve Billiards

by Tal Be'ery6mJuly 29th, 2018
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Recently, Israeli researchers from the Technion published a <a href="http://www.cs.technion.ac.il/~biham/BT/bt-fixed-coordinate-invalid-curve-attack.pdf" target="_blank">paper</a> about a smart attack on vulnerable Bluetooth devices’ pairing process. This vulnerability allows attackers to bypass Bluetooth security measures and be a Man-in-the-Middle (MITM) to eavesdrop or even change the contents of a Bluetooth connection. The root cause of this vulnerability is a flawed implementation of the Elliptic Curve Cryptography within these devices.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Bluetooth Hacking: Cheating in Elliptic Curve Billiards
Tal Be'ery HackerNoon profile picture
Tal Be'ery

Tal Be'ery

@TalBeerySec

L O A D I N G
. . . comments & more!

About Author

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite