Other use-cases include military communications and critical infrastructure in the power, oil & gas, water, and transport sectors and beyond. In this video, we demonstrate an attack on the TEA1 algorithm (CVE-2022-24402), which affects networks relying TEA1 for confidentiality and integrity. The demonstration is performed on a real-world network.
Publications and conferences
We have spent over two and a half year on our TETRA research, including a coordinated disclosure process that lasted over one and a half year. We will fully disclose our research results and present our work at various conferences throughout the year. Below you will find an updated list of the conferences on (aspects of) the TETRA:BURST vulnerabilities.
Date
Title
Venue
Location
August, 9th
All cops are broadcasting: breaking TETRA after decades in the shadows
Las Vegas
No comments:
Post a Comment