Summary

Total Articles Found: 1

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • Technical Advisory – BLE Proximity Authentication Vulnerable to Relay Attacks

Technical Advisory – BLE Proximity Authentication Vulnerable to Relay Attacks

Published: 2022-05-16 17:38:30

Popularity: None

Author: Jennifer Fernick

🤖: ""relay attack fail""

NCC Group has developed a tool for conducting a new type of BLE relay attack operating at the link layer, for which added latency is within the range of normal GATT response timing variation, and which is capable of relaying encrypted link layer communications. This approach can circumvent the existing relay attack mitigations of latency bounding or link layer encryption, and bypass localization defences commonly used against relay attacks that use signal amplification.

...more

end