{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:55:50Z","timestamp":1730321750081,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T00:00:00Z","timestamp":1604620800000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1409053"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3363248","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"2529-2531","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Snout"],"prefix":"10.1145","author":[{"given":"John","family":"Mikulskis","sequence":"first","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Johannes K.","family":"Becker","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Stefan","family":"Gvozdenovic","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"David","family":"Starobinski","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bastille Research. 2016. scapy-radio. https:\/\/github.com\/BastilleResearch\/scapy-radio Bastille Research. 2016. scapy-radio. https:\/\/github.com\/BastilleResearch\/scapy-radio"},{"key":"e_1_3_2_1_2_1","unstructured":"Johannes K Becker and John Mikulskis. 2019. Snout.tools. https:\/\/snout.tools\/ Johannes K Becker and John Mikulskis. 2019. Snout.tools. https:\/\/snout.tools\/"},{"volume-title":"A GNU Radio-based IEEE 802.15.4 Testbed. In 12. GI\/ITG KuVS Fachgespra ch Drahtlose Sensornetze (FGSN","year":"2013","author":"Bloessl Bastian","key":"e_1_3_2_1_3_1"},{"volume-title":"IEEE Symposium on Security and Privacy (SP) (May 2017","year":"2017","author":"Bloessl Bastian","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2751474"},{"key":"e_1_3_2_1_6_1","first-page":"122","article-title":"GNU Radio","volume":"2004","author":"Blossom Eric","year":"2004","journal-title":"Tools for Exploring the Radio Frequency Spectrum. Linux J."},{"key":"e_1_3_2_1_7_1","unstructured":"Martin Braun and Seth Hitefield. 2019. PyBOMBS. https:\/\/github.com\/gnuradio\/pybombs\/ Martin Braun and Seth Hitefield. 2019. PyBOMBS. https:\/\/github.com\/gnuradio\/pybombs\/"},{"key":"e_1_3_2_1_8_1","unstructured":"Bishop Fox. 2019. ZigDiggity. https:\/\/github.com\/BishopFox\/zigdiggity Bishop Fox. 2019. ZigDiggity. https:\/\/github.com\/BishopFox\/zigdiggity"},{"volume-title":"Technical Report TR2014--746","year":"2014","author":"Jenkins Ira Ray","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"Xianjun Jiao. 2019. BTLE. https:\/\/github.com\/JiaoXianjun\/BTLE Xianjun Jiao. 2019. BTLE. https:\/\/github.com\/JiaoXianjun\/BTLE"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658968"},{"key":"e_1_3_2_1_12_1","unstructured":"Gordon Lyon. 2019. Nmap: the Network Mapper. https:\/\/nmap.org\/ Gordon Lyon. 2019. Nmap: the Network Mapper. https:\/\/nmap.org\/"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Jeremy Martin Douglas Alpuche Kristina Bodeman Lamont Brown Ellis Fenske Lucas Foppe Travis Mayberry Erik C. Rye Brandon Sipes and Sam Teplov. 2019. Handoff All Your Privacy: A Review of Apple's Bluetooth Low Energy Continuity Protocol. Jeremy Martin Douglas Alpuche Kristina Bodeman Lamont Brown Ellis Fenske Lucas Foppe Travis Mayberry Erik C. Rye Brandon Sipes and Sam Teplov. 2019. Handoff All Your Privacy: A Review of Apple's Bluetooth Low Energy Continuity Protocol.","DOI":"10.2478\/popets-2019-0057"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098254"},{"key":"e_1_3_2_1_15_1","unstructured":"Ruth Ogunnaike. 2017. SeeSec - IoT Vulnerablity Scanner. https:\/\/github.com\/ruthogunnnaike\/SeeSec--IoT-Vulnerablity-Scanner Ruth Ogunnaike. 2017. SeeSec - IoT Vulnerablity Scanner. https:\/\/github.com\/ruthogunnnaike\/SeeSec--IoT-Vulnerablity-Scanner"},{"volume-title":"Universal Radio Hacker: A Suite for Analyzing and Attacking Stateful Wireless Protocols. In 12th USENIX Workshop on Offensive Technologies (WOOT 18)","year":"2018","author":"Pohl Johannes","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","unstructured":"RadioInspector. 2019. New Generation of Professional TSCM software. https:\/\/www.radioinspector.com\/ RadioInspector. 2019. New Generation of Professional TSCM software. https:\/\/www.radioinspector.com\/"},{"volume-title":"rftap.protocol@gmail.com","year":"2016","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","unstructured":"SecDev. 2006. scapy. https:\/\/github.com\/secdev\/scapy SecDev. 2006. scapy. https:\/\/github.com\/secdev\/scapy"},{"key":"e_1_3_2_1_20_1","unstructured":"River Loop Security. 2018. TumbleRF. https:\/\/github.com\/riverloopsec\/tumblerf River Loop Security. 2018. TumbleRF. https:\/\/github.com\/riverloopsec\/tumblerf"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3363248","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3363248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T18:54:56Z","timestamp":1673290496000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363248"}},"subtitle":["An Extensible IoT Pen-Testing Tool"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":20,"alternative-id":["10.1145\/3319535.3363248","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3363248","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}