Jiska has a M.Sc. in IT-Security. She is a PhD student at the Secure Mobile Networking Lab (TU Darmstadt) since May 2014. Her main research interest are wireless physical layer security and reverse engineering. You might also know her embroidery projects or game shows from past CCC events.
Reversing and Exploiting Broadcom Bluetooth
Lower layers of the Bluetooth protocol are very interesting with regards to security. Mobile devices with Bluetooth enabled will parse frames addressed to them even if they are currently not discoverable. Improper parsing and weird state machines lead to funny exploits.