{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:28:50Z","timestamp":1766449730785,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T00:00:00Z","timestamp":1500336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Research Foundation (DFG)","award":["AR 671\/3-1"],"award-info":[{"award-number":["AR 671\/3-1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,18]]},"DOI":"10.1145\/3098243.3098254","type":"proceedings-article","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T20:03:43Z","timestamp":1499976223000},"page":"230-240","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Insecure to the touch"],"prefix":"10.1145","author":[{"given":"Philipp","family":"Morgner","sequence":"first","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg"}]},{"given":"Stephan","family":"Mattejat","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg"}]},{"given":"Zinaida","family":"Benenson","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg"}]},{"given":"Christian","family":"M\u00fcller","sequence":"additional","affiliation":[{"name":"University of Mannheim"}]},{"given":"Frederik","family":"Armknecht","sequence":"additional","affiliation":[{"name":"University of Mannheim"}]}],"member":"320","published-online":{"date-parts":[[2017,7,18]]},"reference":[{"volume-title":"International Workshop on Security, Privacy and Reliability of Smart Buildings.","year":"2016","author":"Armknecht Frederik","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Bastian Bloessl Christoph Leitner Falko Dressler and Christoph Sommer. 2013. A GNU Radio-based IEEE 802.15.4 Testbed. 12. GI\/ITGFachgespr\u00e4ch Sensornetze (2013) 37.  Bastian Bloessl Christoph Leitner Falko Dressler and Christoph Sommer. 2013. A GNU Radio-based IEEE 802.15.4 Testbed. 12. GI\/ITGFachgespr\u00e4ch Sensornetze (2013) 37."},{"key":"e_1_3_2_1_3_1","unstructured":"Alex Chapman. 2014. Hacking into Internet Connected Light Bulbs. (July 2014). http:\/\/www.contextis.com\/resources\/blog\/hacking-internet-connected-light-bulbs\/  Alex Chapman. 2014. Hacking into Internet Connected Light Bulbs. (July 2014). http:\/\/www.contextis.com\/resources\/blog\/hacking-internet-connected-light-bulbs\/"},{"volume-title":"Hacking Lightbulbs: Security Evaluation of the Philips Hue Personal Wireless Lighting System. (August","year":"2013","author":"Dhanjani Nitesh","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.115"},{"volume":"201","journal-title":"Deral Heiland.","first-page":"R7","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"IEEE Computer Society. 2003. IEEE Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks Specific Requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). IEEE Std 802.15.4-2003 (2003) 1--670.  IEEE Computer Society. 2003. IEEE Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks Specific Requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). IEEE Std 802.15.4-2003 (2003) 1--670."},{"key":"e_1_3_2_1_8_1","unstructured":"Franciscus Wilhelmus Adrianus Alphonsus Van Leeuwen. 2014. Network discovery with touchlink option. (Feb. 27 2014). https:\/\/www.google.com\/patents\/WO2014030103A2 WO Patent App. PCT\/IB2013\/056 663.  Franciscus Wilhelmus Adrianus Alphonsus Van Leeuwen. 2014. Network discovery with touchlink option. (Feb. 27 2014). https:\/\/www.google.com\/patents\/WO2014030103A2 WO Patent App. PCT\/IB2013\/056 663."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/HIS.2014.7086198"},{"key":"e_1_3_2_1_10_1","unstructured":"Philips. 2015. Friends of Hue - Update. (December 2015). http:\/\/www.developers.meethue.com\/documentation\/friends-hue-update  Philips. 2015. Friends of Hue - Update. (December 2015). http:\/\/www.developers.meethue.com\/documentation\/friends-hue-update"},{"volume-title":"Black Hat USA Conference.","year":"2014","author":"Picod J","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"volume-title":"Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. In IEEE European Symposium on Security and Privacy, EuroS&P 2016","year":"2016","author":"Ronen Eyal","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023654"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.475"},{"key":"e_1_3_2_1_16_1","unstructured":"Joshua Wright. 2009. KillerBee: Practical ZigBee Exploitation Framework. (2009). http:\/\/www.willhackforsushi.com\/presentations\/toorcon11-wright.pdf ToorCon 11.  Joshua Wright. 2009. KillerBee: Practical ZigBee Exploitation Framework. (2009). http:\/\/www.willhackforsushi.com\/presentations\/toorcon11-wright.pdf ToorCon 11."},{"key":"e_1_3_2_1_17_1","unstructured":"ZigBee Alliance. 2012. ZigBee Light Link Standard Version 1.0 - Document 11-0037-10.  ZigBee Alliance. 2012. ZigBee Light Link Standard Version 1.0 - Document 11-0037-10."},{"key":"e_1_3_2_1_18_1","unstructured":"ZigBee Alliance. 2013. Smart Energy Profile 2 Application Protocol Standard - Document 13-0200-00.  ZigBee Alliance. 2013. Smart Energy Profile 2 Application Protocol Standard - Document 13-0200-00."},{"key":"e_1_3_2_1_19_1","unstructured":"ZigBee Alliance. 2013. ZigBee Home Automation Public Application Profile Version 1.2 - Document 05-3520-29.  ZigBee Alliance. 2013. ZigBee Home Automation Public Application Profile Version 1.2 - Document 05-3520-29."},{"key":"e_1_3_2_1_20_1","unstructured":"ZigBee Alliance. 2016. Base Device Behavior Specification Version 1.0 -- Document 13-0402-13.  ZigBee Alliance. 2016. Base Device Behavior Specification Version 1.0 -- Document 13-0402-13."},{"key":"e_1_3_2_1_21_1","unstructured":"ZigBee Alliance. 2016. zigbee alliance Accelerates IoT Unification with 20 zigbee 3.0 Platform Certifications. (December 2016). http:\/\/www.zigbee.org\/zigbee-alliance-accelerates-iot-unification-with-20-zigbee-3-0-platform-certifications\/  ZigBee Alliance. 2016. zigbee alliance Accelerates IoT Unification with 20 zigbee 3.0 Platform Certifications. (December 2016). http:\/\/www.zigbee.org\/zigbee-alliance-accelerates-iot-unification-with-20-zigbee-3-0-platform-certifications\/"},{"key":"e_1_3_2_1_22_1","unstructured":"ZigBee Alliance. 2016. ZigBee Cluster Library Specification Revision 6 - Document 07-5123-06.  ZigBee Alliance. 2016. ZigBee Cluster Library Specification Revision 6 - Document 07-5123-06."},{"key":"e_1_3_2_1_23_1","unstructured":"ZigBee Alliance. 2017. The zigbee alliance to Unveil Universal Language for the IoT from CES 2017 --- Making it Possible for Smart Objects to Work Together on Any Network. (January 2017). http:\/\/www.zigbee.org\/the-zigbee-alliance-to-unveil-universal-language-for-the-iot-from-ces-2017-making-it-possible-for-smart-objects-to-work-together-on-any-network\/  ZigBee Alliance. 2017. The zigbee alliance to Unveil Universal Language for the IoT from CES 2017 --- Making it Possible for Smart Objects to Work Together on Any Network. (January 2017). http:\/\/www.zigbee.org\/the-zigbee-alliance-to-unveil-universal-language-for-the-iot-from-ces-2017-making-it-possible-for-smart-objects-to-work-together-on-any-network\/"},{"key":"e_1_3_2_1_24_1","unstructured":"ZigBee Alliance. 2017. ZigBee Certified Products. (2017). http:\/\/www.zigbee.org\/zigbee-products-2\/  ZigBee Alliance. 2017. ZigBee Certified Products. (2017). http:\/\/www.zigbee.org\/zigbee-products-2\/"},{"key":"e_1_3_2_1_25_1","unstructured":"ZigBee Standards Organization. 2012. ZigBee Specification - Document 053474r20.  ZigBee Standards Organization. 2012. ZigBee Specification - Document 053474r20."},{"key":"e_1_3_2_1_27_1","unstructured":"Tobias Zillner and Sebastian Strobl. 2015. ZigBee Exploited - The good the bad and the ugly. (2015). https:\/\/www.blackhat.com\/us-15\/briefings.html#zigbee-exploited-the-good-the-bad-and-the-ugly Black Hat USA.  Tobias Zillner and Sebastian Strobl. 2015. ZigBee Exploited - The good the bad and the ugly. (2015). https:\/\/www.blackhat.com\/us-15\/briefings.html#zigbee-exploited-the-good-the-bad-and-the-ugly Black Hat USA."}],"event":{"name":"WiSec '17: 10th ACM Conference on Security & Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","NSF National Science Foundation","ACM Association for Computing Machinery"],"location":"Boston Massachusetts","acronym":"WiSec '17"},"container-title":["Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098243.3098254","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3098243.3098254","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:03Z","timestamp":1750217403000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098243.3098254"}},"subtitle":["attacking ZigBee 3.0 via touchlink commissioning"],"short-title":[],"issued":{"date-parts":[[2017,7,18]]},"references-count":26,"alternative-id":["10.1145\/3098243.3098254","10.1145\/3098243"],"URL":"https:\/\/doi.org\/10.1145\/3098243.3098254","relation":{},"subject":[],"published":{"date-parts":[[2017,7,18]]},"assertion":[{"value":"2017-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}