{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T19:21:10Z","timestamp":1770060070557,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1409053"],"award-info":[{"award-number":["CNS-1409053"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3363248","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"2529-2531","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Snout"],"prefix":"10.1145","author":[{"given":"John","family":"Mikulskis","sequence":"first","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Johannes K.","family":"Becker","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Stefan","family":"Gvozdenovic","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"David","family":"Starobinski","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bastille Research. 2016. scapy-radio. https:\/\/github.com\/BastilleResearch\/scapy-radio  Bastille Research. 2016. scapy-radio. https:\/\/github.com\/BastilleResearch\/scapy-radio"},{"key":"e_1_3_2_1_2_1","unstructured":"Johannes K Becker and John Mikulskis. 2019. Snout.tools. https:\/\/snout.tools\/  Johannes K Becker and John Mikulskis. 2019. Snout.tools. https:\/\/snout.tools\/"},{"key":"e_1_3_2_1_3_1","volume-title":"A GNU Radio-based IEEE 802.15.4 Testbed. In 12. GI\/ITG KuVS Fachgespra ch Drahtlose Sensornetze (FGSN","author":"Bloessl Bastian","year":"2013"},{"key":"e_1_3_2_1_4_1","volume-title":"IEEE Symposium on Security and Privacy (SP) (May 2017","author":"Bloessl Bastian","year":"2017"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2751474"},{"key":"e_1_3_2_1_6_1","first-page":"122","article-title":"GNU Radio","volume":"2004","author":"Blossom Eric","year":"2004","journal-title":"Tools for Exploring the Radio Frequency Spectrum. Linux J."},{"key":"e_1_3_2_1_7_1","unstructured":"Martin Braun and Seth Hitefield. 2019. PyBOMBS. https:\/\/github.com\/gnuradio\/pybombs\/  Martin Braun and Seth Hitefield. 2019. PyBOMBS. https:\/\/github.com\/gnuradio\/pybombs\/"},{"key":"e_1_3_2_1_8_1","unstructured":"Bishop Fox. 2019. ZigDiggity. https:\/\/github.com\/BishopFox\/zigdiggity  Bishop Fox. 2019. ZigDiggity. https:\/\/github.com\/BishopFox\/zigdiggity"},{"key":"e_1_3_2_1_9_1","volume-title":"Technical Report TR2014--746","author":"Jenkins Ira Ray","year":"2014"},{"key":"e_1_3_2_1_10_1","unstructured":"Xianjun Jiao. 2019. BTLE. https:\/\/github.com\/JiaoXianjun\/BTLE  Xianjun Jiao. 2019. BTLE. https:\/\/github.com\/JiaoXianjun\/BTLE"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658968"},{"key":"e_1_3_2_1_12_1","unstructured":"Gordon Lyon. 2019. Nmap: the Network Mapper. https:\/\/nmap.org\/  Gordon Lyon. 2019. Nmap: the Network Mapper. https:\/\/nmap.org\/"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Jeremy Martin Douglas Alpuche Kristina Bodeman Lamont Brown Ellis Fenske Lucas Foppe Travis Mayberry Erik C. Rye Brandon Sipes and Sam Teplov. 2019. Handoff All Your Privacy: A Review of Apple's Bluetooth Low Energy Continuity Protocol.  Jeremy Martin Douglas Alpuche Kristina Bodeman Lamont Brown Ellis Fenske Lucas Foppe Travis Mayberry Erik C. Rye Brandon Sipes and Sam Teplov. 2019. Handoff All Your Privacy: A Review of Apple's Bluetooth Low Energy Continuity Protocol.","DOI":"10.2478\/popets-2019-0057"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098254"},{"key":"e_1_3_2_1_15_1","unstructured":"Ruth Ogunnaike. 2017. SeeSec - IoT Vulnerablity Scanner. https:\/\/github.com\/ruthogunnnaike\/SeeSec--IoT-Vulnerablity-Scanner  Ruth Ogunnaike. 2017. SeeSec - IoT Vulnerablity Scanner. https:\/\/github.com\/ruthogunnnaike\/SeeSec--IoT-Vulnerablity-Scanner"},{"key":"e_1_3_2_1_16_1","volume-title":"Universal Radio Hacker: A Suite for Analyzing and Attacking Stateful Wireless Protocols. In 12th USENIX Workshop on Offensive Technologies (WOOT 18)","author":"Pohl Johannes","year":"2018"},{"key":"e_1_3_2_1_17_1","unstructured":"RadioInspector. 2019. New Generation of Professional TSCM software. https:\/\/www.radioinspector.com\/  RadioInspector. 2019. New Generation of Professional TSCM software. https:\/\/www.radioinspector.com\/"},{"key":"e_1_3_2_1_18_1","volume-title":"rftap.protocol@gmail.com","year":"2016"},{"key":"e_1_3_2_1_19_1","unstructured":"SecDev. 2006. scapy. https:\/\/github.com\/secdev\/scapy  SecDev. 2006. scapy. https:\/\/github.com\/secdev\/scapy"},{"key":"e_1_3_2_1_20_1","unstructured":"River Loop Security. 2018. TumbleRF. https:\/\/github.com\/riverloopsec\/tumblerf  River Loop Security. 2018. TumbleRF. https:\/\/github.com\/riverloopsec\/tumblerf"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363248","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3363248","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3363248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:33Z","timestamp":1750203873000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363248"}},"subtitle":["An Extensible IoT Pen-Testing Tool"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":20,"alternative-id":["10.1145\/3319535.3363248","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3363248","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}