Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Breaking Matter: Vulnerabilities in the Matter Protocol

Black Hat via YouTube

Overview

Udemy Special: Ends May 28!
Learn Data Science. Courses starting at $12.99.
Get Deal
This Black Hat conference talk explores critical vulnerabilities in the Matter protocol, an emerging standard for secure IoT connectivity. Dive into a 40-minute security analysis presented by Bela Genge that introduces a novel attack vector called Delayed Denial of Service (DeeDoS), which allows attackers outside a fabric to disable connected devices. Learn about the security challenges facing the Matter protocol as IoT devices become increasingly integrated into physical environments, where exploitation could lead to dangerous real-world consequences like unauthorized access to doors or control of home systems. With over 15 billion connected devices globally expanding the attack surface, understand why intensive research on IoT standards is essential for security professionals. The presentation provides valuable insights for cybersecurity experts looking to understand and mitigate vulnerabilities in this security-focused protocol that has not yet been sufficiently challenged in public security research.

Syllabus

Breaking Matter: Vulnerabilities in the Matter Protocol

Taught by

Black Hat

Reviews

Start your review of Breaking Matter: Vulnerabilities in the Matter Protocol

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.