Главная
Study mode:
on
1
Intro
2
The underlying ZLL protocol
3
Creating a lightbulb worm
4
Taking over a preinstalled smart light
5
Protocol Outline
6
Protocol Implementation Bug
7
Protocol Attack Outline
8
We bought a cheap and lightweight commercial Zigbee evaluation kit
9
Spreading everywhere
10
New CPA attack on CCM
11
A New Type of Attack
12
Responsible disclousre
13
What went wrong?
Description:
Explore the potential security risks of IoT devices in densely populated urban areas through this IEEE Symposium presentation. Delve into a case study involving Philips Hue smart lamps to understand how a worm can spread rapidly using ZigBee wireless connectivity and physical proximity. Learn about the critical mass of devices needed for a chain reaction, techniques for exploiting vulnerabilities in the ZigBee Light Link protocol, and methods for extracting encryption keys. Gain insights into the challenges of securing IoT devices, even for large companies using standard cryptographic techniques. Examine the implications of this research for future IoT security and urban infrastructure protection.

IoT Goes Nuclear - Creating a Zigbee Chain Reaction

IEEE
Add to list
0:00 / 0:00