, Device (hci1) successfully instanciated ! [INFO] Importing GATT layer datas from /tmp/gatt.cfg
, Starting firmware recuperation
,
, Write Command : handle = 0x40 / value = 000017deffff0500007c42424242ffffffff
Iot security: Ongoing challenges and research opportunities, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, vol.11, pp.230-234, 2014. ,
KillerBee: Practical ZigBee Exploitation Framework, 2009. ,
You'd better secure your BLE Devices or we'll kick your butts !, 2018. ,
Ubertooth, 2012. ,
Weaponizing the BBC Micro:Bit, 2017. ,
SubGHz or Bust, 2012. ,
A framework for the measurement of software quality, ACM SIGSOFT Software Engineering Notes, vol.3, pp.133-139, 1978. ,
Overview and open issues on penetration test, Journal of the Brazilian Computer Society, vol.23, p.2017 ,
Understanding the mirai botnet, 26th USENIX Security Symposium (USENIX Security 17), pp.1093-1110, 2017. ,
Blackiot: Iot botnet of high wattage devices can disrupt the power grid, 27th USENIX Security Symposium (USENIX Security 18), pp.15-32, 2018. ,
Iot sentinel: Automated device-type identification for security enforcement in iot, CoRR, 2016. ,
Radiot: Radio communications intrusion detection for iot -A protocol independent approach, CoRR, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01914981
Iotpot: Analysing the rise of iot compromises, 9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015. ,
Iot goes nuclear: Creating a zigbee chain reaction, 2017 IEEE Symposium on Security and Privacy (SP), pp.195-212, 2017. ,
Bluetooth: With low energy comes low security, Proceedings of the 7th USENIX Conference on Offensive Technologies, WOOT'13, pp.4-4, 2013. ,
Blueborne Technical White Paper, 2017. ,
Packets in packets: Orson welles' in-band signaling attacks for modern radios, Proceedings of the 5th USENIX Conference on Offensive Technologies, pp.7-7, 2011. ,
MouseJack : White Paper, 2016. ,
BtleJuice, un framework d'interception pour le Bluetooth Low Energy ,
Gattacking Bluetooth Smart Devices, 2017. ,
Penetration testing in the iot age, Computer, vol.51, pp.82-85, 2018. ,