IoT Goes Nuclear: Creating a ZigBee Chain Reaction
暂无分享,去创建一个
Adi Shamir | Colin O'Flynn | Eyal Ronen | Achi-Or Weingarten | A. Shamir | C. O'Flynn | Eyal Ronen | Achi-Or Weingarten
[1] Russ Housley,et al. Using Advanced Encryption Standard (AES) CCM Mode with IPsec Encapsulating Security Payload (ESP) , 2005, RFC.
[2] Tobias Zillner,et al. ZigBee Exploited The good , the bad and the ugly , 2015 .
[3] Zhizhang Chen,et al. ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research , 2014, COSADE.
[4] William P. Marnane,et al. Unknown Plaintext Template Attacks , 2009, WISA.
[5] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[6] Ilya Kizhvatov,et al. Side channel analysis of AVR XMEGA crypto engine , 2009, WESS '09.
[7] Zinaida Benenson,et al. All Your Bulbs Are Belong to Us: Investigating the Current State of Security in Connected Lighting Systems , 2016, ArXiv.
[8] Christof Paar,et al. Efficient Hash-Based Signatures on Embedded Devices , 2008 .
[9] J. Massey. Guessing and entropy , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[10] Stefano Zanero,et al. Studying Bluetooth Malware Propagation: The BlueBag Project , 2007, IEEE Security & Privacy.
[11] Colin O'Flynn,et al. Message Denial and Alteration on IEEE 802.15.4 Low-Power Radio Networks , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.
[12] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[13] Brad Lehman,et al. LED lighting flicker and potential health concerns: IEEE standard PAR1789 update , 2010, 2010 IEEE Energy Conversion Congress and Exposition.
[14] Frederik Armknecht,et al. On the security of the ZigBee Light Link touchlink commissioning procedure , 2016, Sicherheit.
[15] Russ Housley,et al. Counter with CBC-MAC (CCM) , 2003, RFC.
[16] Sergey Bratus,et al. Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters , 2012, 2012 45th Hawaii International Conference on System Sciences.
[17] Joshua Jaffe,et al. A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter , 2007, CHES.
[18] David A. McGrew,et al. AES-CCM Cipher Suites for Transport Layer Security (TLS) , 2012, RFC.
[19] Adi Shamir,et al. Extended Functionality Attacks on IoT Devices: The Case of Smart Lights , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[20] Zhizhang Chen,et al. Power Analysis Attacks Against IEEE 802.15.4 Nodes , 2016, COSADE.