https://www.synopsys.com/blogs/software-security/wp-content/uploads/2020/03/sweyntooth-bluetooth-vulnerabilities-4.png