Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares

4 views

Black Hat

7 hours ago

Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares

Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares