5

Vulnerability Publishing –Getting Your Work Published in Databases

In September 2017, the security researchers working at Armis Labs published research on weaknesses in the Bluetooth protocol. They named these weaknesses and the associated vulnerabilities BlueBorne. BlueBorne vulnerabilities allow attackers to gain access to a device without the user’s knowledge or interaction. The attacker can then take complete control of the victim’s device. The researchers discovered that there were eight vulnerabilities in the Bluetooth protocol that could be exploited to carry out this kind of attack. These vulnerabilities affected all devices that use Bluetooth, including smartphones, laptops, and Internet of Things (IoT) devices. Their research was ...

Get The Vulnerability Researcher's Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.