, Device (hci1) successfully instanciated ! [INFO] Importing GATT layer datas from /tmp/gatt.cfg

, Starting firmware recuperation

#. Writing,

, Write Command : handle = 0x40 / value = 000017deffff0500007c42424242ffffffff

Z. Zhang, Iot security: Ongoing challenges and research opportunities, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, vol.11, pp.230-234, 2014.

J. Wright, KillerBee: Practical ZigBee Exploitation Framework, 2009.

D. , You'd better secure your BLE Devices or we'll kick your butts !, 2018.

D. Spill, Ubertooth, 2012.

D. , Weaponizing the BBC Micro:Bit, 2017.

. Atlas, SubGHz or Bust, 2012.

J. P. Cavano and J. A. Mccall, A framework for the measurement of software quality, ACM SIGSOFT Software Engineering Notes, vol.3, pp.133-139, 1978.

D. , D. Bertoglio, and A. Zorzo, Overview and open issues on penetration test, Journal of the Brazilian Computer Society, vol.23, p.2017

M. Antonakakis, Understanding the mirai botnet, 26th USENIX Security Symposium (USENIX Security 17), pp.1093-1110, 2017.

S. Soltan, P. Mittal, and H. V. Poor, Blackiot: Iot botnet of high wattage devices can disrupt the power grid, 27th USENIX Security Symposium (USENIX Security 18), pp.15-32, 2018.

M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A. Sadeghi et al., Iot sentinel: Automated device-type identification for security enforcement in iot, CoRR, 2016.

J. Roux, E. Alata, G. Auriol, M. Kaâniche, V. Nicomette et al., Radiot: Radio communications intrusion detection for iot -A protocol independent approach, CoRR, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01914981

Y. M. Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama et al., Iotpot: Analysing the rise of iot compromises, 9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015.

E. Ronen, A. Shamir, A. Weingarten, and C. Oflynn, Iot goes nuclear: Creating a zigbee chain reaction, 2017 IEEE Symposium on Security and Privacy (SP), pp.195-212, 2017.

M. Ryan, Bluetooth: With low energy comes low security, Proceedings of the 7th USENIX Conference on Offensive Technologies, WOOT'13, pp.4-4, 2013.

. Armis, Blueborne Technical White Paper, 2017.

T. Goodspeed, S. Bratus, R. Melgares, R. Shapiro, and R. Speers, Packets in packets: Orson welles' in-band signaling attacks for modern radios, Proceedings of the 5th USENIX Conference on Offensive Technologies, pp.7-7, 2011.

M. Newlin, MouseJack : White Paper, 2016.

D. , BtleJuice, un framework d'interception pour le Bluetooth Low Energy

S. Jasek, Gattacking Bluetooth Smart Devices, 2017.

C. Chen, Z. Zhang, S. Lee, and S. Shieh, Penetration testing in the iot age, Computer, vol.51, pp.82-85, 2018.