Logo
  • Home
  • Benefits
  • Clients
  • Contact Us
  • Blog
    • Security Advisory
    • Port
    • Development Tools
    • Blog Listing
  • Home
  • Benefits
  • Clients
  • Contact Us
  • Blog
    • Security Advisory
    • Port
    • Development Tools
    • Blog Listing

BTstack Port for STM32 USB

  • bluekitchen / 11th February 2021

BTstack Port for STM32 USB

BTstack Development Port STM32 Port
In this blog post, we provide an overview on how to use Bluetooth Controllers via USB as well report on our journey of porting BTstack to the

Read More

  • bluekitchen / 3rd January 2021

MSP432P401R + CC2564C Port: UART without Hardware RTS/CTS Flow Control

Hardware Abstraction Port
When using Bluetooth Controllers via the H4/UART transport, there’s no error-correction mechanism. Therefore, a single lost byte causes the

Read More

  • bluekitchen / 23rd December 2020

HCI PacketLog Converter for Sublime Text 3

Packet Logger
BTstack can output application logs inlined with HCI traffic. We internally just call it HCI dump, and use this feature on a daily basis, whether

Read More

  • bluekitchen / 10th December 2020

BLESA: GATT Client Vulnerabilities

Security Advisory
For Bluetooth Low Energy (BLE) connections, most application make use of the Generic Attribute Profile (GATT) profile. Access to data on the GATT

Read More

  • bluekitchen / 23rd October 2020

BLURtooth: BLUR Attacks on CTKD

Security Advisory
The Cross-transport Key Derivation (CTKD) between Bluetooth LE and Classic (BR/EDR) transports introduces various security issues depending on

Read More

  • bluekitchen / 20th October 2020

Method Confustion Attack on Bluetooth Pairing

Security Advisory
LE Secure Connections uses the Passkey entry method to prevent MITM attacks. However, the new ‘Method Confusion Attack’ shows that a

Read More

  • bluekitchen / 15th September 2020

BIAS: Bluetooth Impersonation AttackS

Security Advisory
A new Bluetooth security paper Bluetooth Impersonation AttackS (BIAS) shows how flaws in the Bluetooth spec can be used to perform a variant of

Read More

  • bluekitchen / 19th August 2019

KNOB: Key Negotiation of Bluetooth Attack

Security Advisory
The new KNOB attack exploits a flaw in the key negotiation protocol for classic connections and lets an attacker reduce the effective key length

Read More

  • bluekitchen / 29th November 2018

Low Energy Legacy Pairing Re-evaluated

Security Advisory
Re-evaluating LE Legacy Pairing, we realized that customers could miss to set two security keys (ER + IR) to persistent random values, which

Read More

© Copyright 2017 by BlueKitchen GmbH.   Design based on a Themeum theme.