{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:29:38Z","timestamp":1766449778158,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"RGC","award":["R4032-18"],"award-info":[{"award-number":["R4032-18"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1145\/3545948.3545953","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T11:21:49Z","timestamp":1666005709000},"page":"292-307","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Zigbee\u2019s Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications"],"prefix":"10.1145","author":[{"given":"Jincheng","family":"Wang","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, The Chinese University of Hong Kong, China"}]},{"given":"Zhuohua","family":"Li","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, China"}]},{"given":"Mingshen","family":"Sun","sequence":"additional","affiliation":[{"name":"Baidu, China"}]},{"given":"John C.S.","family":"Lui","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. AN1233: Zigbee Security. https:\/\/linproxy.fan.workers.dev:443\/https\/www.silabs.com\/documents\/public\/application-notes\/an1233-zigbee-security.pdf  [n.d.]. AN1233: Zigbee Security. https:\/\/linproxy.fan.workers.dev:443\/https\/www.silabs.com\/documents\/public\/application-notes\/an1233-zigbee-security.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. What\u2019s New in Zigbee 3.0. https:\/\/linproxy.fan.workers.dev:443\/https\/www.ti.com\/lit\/an\/swra615a\/swra615a.pdf  [n.d.]. What\u2019s New in Zigbee 3.0. https:\/\/linproxy.fan.workers.dev:443\/https\/www.ti.com\/lit\/an\/swra615a\/swra615a.pdf"},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. ZigBee 3.0 \u2013 Facilitating the Internet of Things. https:\/\/linproxy.fan.workers.dev:443\/https\/www.nxp.com\/docs\/en\/brochure\/75017677.pdf  [n.d.]. ZigBee 3.0 \u2013 Facilitating the Internet of Things. https:\/\/linproxy.fan.workers.dev:443\/https\/www.nxp.com\/docs\/en\/brochure\/75017677.pdf"},{"key":"e_1_3_2_1_4_1","unstructured":"2018. Hub tells ZigBee End Device to Leave on Rejoin. https:\/\/linproxy.fan.workers.dev:443\/https\/community.smartthings.com\/t\/hub-tells-zigbee-end-device-to-leave-on-rejoin\/128646.  2018. Hub tells ZigBee End Device to Leave on Rejoin. https:\/\/linproxy.fan.workers.dev:443\/https\/community.smartthings.com\/t\/hub-tells-zigbee-end-device-to-leave-on-rejoin\/128646."},{"key":"e_1_3_2_1_5_1","unstructured":"2020. AN1233: Zigbee Security. https:\/\/linproxy.fan.workers.dev:443\/https\/www.silabs.com\/documents\/public\/application-notes\/an1233-zigbee-security.pdf.  2020. AN1233: Zigbee Security. https:\/\/linproxy.fan.workers.dev:443\/https\/www.silabs.com\/documents\/public\/application-notes\/an1233-zigbee-security.pdf."},{"key":"e_1_3_2_1_6_1","unstructured":"2020. Overview of Samsung SmartThings Secure Mode. https:\/\/linproxy.fan.workers.dev:443\/https\/www.samsung.com\/sg\/support\/mobile-devices\/overview-of-samsung-smartthings-secure-mode\/.  2020. Overview of Samsung SmartThings Secure Mode. https:\/\/linproxy.fan.workers.dev:443\/https\/www.samsung.com\/sg\/support\/mobile-devices\/overview-of-samsung-smartthings-secure-mode\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399363"},{"key":"e_1_3_2_1_8_1","unstructured":"ZigBee Alliance. 2015. ZigBee Specification. https:\/\/linproxy.fan.workers.dev:443\/https\/zigbeealliance.org\/wp-content\/uploads\/2019\/11\/docs-05-3474-21-0csg-zigbee-specification.pdf  ZigBee Alliance. 2015. ZigBee Specification. https:\/\/linproxy.fan.workers.dev:443\/https\/zigbeealliance.org\/wp-content\/uploads\/2019\/11\/docs-05-3474-21-0csg-zigbee-specification.pdf"},{"key":"e_1_3_2_1_9_1","volume-title":"Igniting IoT Innovation","author":"Alliance Zigbee","year":"2023","unstructured":"Zigbee Alliance . 2021. Analysts Confirm Half a Billion Zigbee Chipsets Sold , Igniting IoT Innovation ; Figures to Reach 3.8 Billion by 2023 . https:\/\/linproxy.fan.workers.dev:443\/https\/zigbeealliance.org\/news_and_articles\/analysts-confirm-half-a-billion-zigbee-chipsets-sold-igniting-iot-innovation-figures-to-reach-3-8-billion-by-2023\/ Zigbee Alliance. 2021. Analysts Confirm Half a Billion Zigbee Chipsets Sold, Igniting IoT Innovation; Figures to Reach 3.8 Billion by 2023. https:\/\/linproxy.fan.workers.dev:443\/https\/zigbeealliance.org\/news_and_articles\/analysts-confirm-half-a-billion-zigbee-chipsets-sold-igniting-iot-innovation-figures-to-reach-3-8-billion-by-2023\/"},{"key":"e_1_3_2_1_10_1","unstructured":"Zigbee Alliance. 2021. Products Certified by ZigBee Alliance. https:\/\/linproxy.fan.workers.dev:443\/https\/zigbeealliance.org\/product_type\/certified_product\/  Zigbee Alliance. 2021. Products Certified by ZigBee Alliance. https:\/\/linproxy.fan.workers.dev:443\/https\/zigbeealliance.org\/product_type\/certified_product\/"},{"key":"e_1_3_2_1_11_1","volume-title":"Rejoin Vulnerability: Attack videos and traffic logs. https:\/\/linproxy.fan.workers.dev:443\/https\/sites.google.com\/view\/rejoin-vulnerability\/attack-materials?authuser=0","author":"Anonymous","year":"2021","unstructured":"Anonymous . 2021 . Rejoin Vulnerability: Attack videos and traffic logs. https:\/\/linproxy.fan.workers.dev:443\/https\/sites.google.com\/view\/rejoin-vulnerability\/attack-materials?authuser=0 Anonymous. 2021. Rejoin Vulnerability: Attack videos and traffic logs. https:\/\/linproxy.fan.workers.dev:443\/https\/sites.google.com\/view\/rejoin-vulnerability\/attack-materials?authuser=0"},{"key":"e_1_3_2_1_12_1","unstructured":"Anouymous. 2021. Responses from the alliance and vendors. https:\/\/linproxy.fan.workers.dev:443\/https\/sites.google.com\/view\/rejoin-vulnerability\/alliancevendor-responses.  Anouymous. 2021. Responses from the alliance and vendors. https:\/\/linproxy.fan.workers.dev:443\/https\/sites.google.com\/view\/rejoin-vulnerability\/alliancevendor-responses."},{"key":"e_1_3_2_1_13_1","volume-title":"4-2011 IEEE Standard for Local and Metropolitan Area Networks-Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)","author":"IEEE\u00a0Standards Association 2011. 802.15.","year":"2011","unstructured":"IEEE\u00a0Standards Association 2011. 802.15. 4-2011 IEEE Standard for Local and Metropolitan Area Networks-Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) . IEEE Standards Association( 2011 ). IEEE\u00a0Standards Association 2011. 802.15. 4-2011 IEEE Standard for Local and Metropolitan Area Networks-Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs). IEEE Standards Association(2011)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243846"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_22"},{"key":"e_1_3_2_1_16_1","volume-title":"Soteria: Automated iot safety and security analysis. In 2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18). 147\u2013158.","author":"Celik Z\u00a0Berkay","year":"2018","unstructured":"Z\u00a0Berkay Celik , Patrick McDaniel , and Gang Tan . 2018 . Soteria: Automated iot safety and security analysis. In 2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18). 147\u2013158. Z\u00a0Berkay Celik, Patrick McDaniel, and Gang Tan. 2018. Soteria: Automated iot safety and security analysis. In 2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18). 147\u2013158."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00056"},{"key":"e_1_3_2_1_18_1","volume-title":"USENIX Security Symposium, Vol.\u00a0139","author":"Cho Chia\u00a0Yuan","year":"2011","unstructured":"Chia\u00a0Yuan Cho , Domagoj Babic , Pongsin Poosankam , Kevin\u00a0Zhijie Chen , Edward\u00a0 XueJun Wu , and Dawn Song . 2011 . MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery .. In USENIX Security Symposium, Vol.\u00a0139 . Chia\u00a0Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin\u00a0Zhijie Chen, Edward\u00a0XueJun Wu, and Dawn Song. 2011. MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery.. In USENIX Security Symposium, Vol.\u00a0139."},{"volume-title":"Model checking","author":"Clarke\u00a0Jr M","key":"e_1_3_2_1_19_1","unstructured":"Edmund\u00a0 M Clarke\u00a0Jr , Orna Grumberg , Daniel Kroening , Doron Peled , and Helmut Veith . 2018. Model checking . MIT press . Edmund\u00a0M Clarke\u00a0Jr, Orna Grumberg, Daniel Kroening, Doron Peled, and Helmut Veith. 2018. Model checking. MIT press."},{"key":"e_1_3_2_1_20_1","unstructured":"dattatray. 2017. IoT Security \u2013 Part 6 (ZigBee Security - 101). https:\/\/linproxy.fan.workers.dev:443\/https\/payatu.com\/blog\/dattatray\/zigbee-security-101.  dattatray. 2017. IoT Security \u2013 Part 6 (ZigBee Security - 101). https:\/\/linproxy.fan.workers.dev:443\/https\/payatu.com\/blog\/dattatray\/zigbee-security-101."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243865"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX Security Symposium. 257\u2013272","author":"Ensafi Roya","year":"2010","unstructured":"Roya Ensafi , Jong\u00a0Chun Park , Deepak Kapur , and Jedidiah\u00a0 R Crandall . 2010 . Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking .. In USENIX Security Symposium. 257\u2013272 . Roya Ensafi, Jong\u00a0Chun Park, Deepak Kapur, and Jedidiah\u00a0R Crandall. 2010. Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.. In USENIX Security Symposium. 257\u2013272."},{"key":"e_1_3_2_1_24_1","volume-title":"Security analysis of zigbee. MWR InfoSecurity","author":"Fan Xueqi","year":"2017","unstructured":"Xueqi Fan , Fransisca Susan , William Long , and Shangyan Li. 2017. Security analysis of zigbee. MWR InfoSecurity ( 2017 ), 1\u201318. Xueqi Fan, Fransisca Susan, William Long, and Shangyan Li. 2017. Security analysis of zigbee. MWR InfoSecurity (2017), 1\u201318."},{"key":"e_1_3_2_1_25_1","volume-title":"International Conference on Protocol Specification, Testing and Verification. Springer, 3\u201318","author":"Gerth Rob","year":"1995","unstructured":"Rob Gerth , Doron Peled , Moshe\u00a0 Y Vardi , and Pierre Wolper . 1995 . Simple on-the-fly automatic verification of linear temporal logic . In International Conference on Protocol Specification, Testing and Verification. Springer, 3\u201318 . Rob Gerth, Doron Peled, Moshe\u00a0Y Vardi, and Pierre Wolper. 1995. Simple on-the-fly automatic verification of linear temporal logic. In International Conference on Protocol Specification, Testing and Verification. Springer, 3\u201318."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71209-1_23"},{"key":"e_1_3_2_1_27_1","unstructured":"Qi Hardware. 2013. Ben-WPAN Overview. https:\/\/linproxy.fan.workers.dev:443\/http\/downloads.qi-hardware.com\/people\/werner\/wpan\/web\/  Qi Hardware. 2013. Ben-WPAN Overview. https:\/\/linproxy.fan.workers.dev:443\/http\/downloads.qi-hardware.com\/people\/werner\/wpan\/web\/"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2899758"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354263"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Samuel Jero Md\u00a0Endadul Hoque David\u00a0R Choffnes Alan Mislove and Cristina Nita-Rotaru. 2018. Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach.. In NDSS.  Samuel Jero Md\u00a0Endadul Hoque David\u00a0R Choffnes Alan Mislove and Cristina Nita-Rotaru. 2018. Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach.. In NDSS.","DOI":"10.14722\/ndss.2018.23115"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"e_1_3_2_1_33_1","unstructured":"SILLICON LABS. 2021. Various keys used in ZLL Commissioning Plug-in in EmberZNet PRO stack. https:\/\/linproxy.fan.workers.dev:443\/https\/community.silabs.com\/s\/article\/various-keys-used-in-zll-commissioning-plug-in-in-emberznet-pro-stack?language=en_US.  SILLICON LABS. 2021. Various keys used in ZLL Commissioning Plug-in in EmberZNet PRO stack. https:\/\/linproxy.fan.workers.dev:443\/https\/community.silabs.com\/s\/article\/various-keys-used-in-zll-commissioning-plug-in-in-emberznet-pro-stack?language=en_US."},{"key":"e_1_3_2_1_34_1","unstructured":"Silicon Labs. 2021. Zigbee 3.0 Prevention of Trust Center Rejoins best practices. https:\/\/linproxy.fan.workers.dev:443\/https\/community.silabs.com\/s\/article\/zigbee-3-0-prevention-of-trust-center-rejoins-best-practices  Silicon Labs. 2021. Zigbee 3.0 Prevention of Trust Center Rejoins best practices. https:\/\/linproxy.fan.workers.dev:443\/https\/community.silabs.com\/s\/article\/zigbee-3-0-prevention-of-trust-center-rejoins-best-practices"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.229904"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384217.3385617"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139938"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2935189"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings. 2nd IEEE Workshop on Industrial Strength Formal Specification Techniques. IEEE, 90\u2013101","author":"Mikk Erich","year":"1998","unstructured":"Erich Mikk , Yassine Lakhnech , Michael Siegel , and Gerard\u00a0 J Holzmann . 1998 . Implementing statecharts in PROMELA\/SPIN . In Proceedings. 2nd IEEE Workshop on Industrial Strength Formal Specification Techniques. IEEE, 90\u2013101 . Erich Mikk, Yassine Lakhnech, Michael Siegel, and Gerard\u00a0J Holzmann. 1998. Implementing statecharts in PROMELA\/SPIN. In Proceedings. 2nd IEEE Workshop on Industrial Strength Formal Specification Techniques. IEEE, 90\u2013101."},{"key":"e_1_3_2_1_40_1","unstructured":"Philipp Morgner Stephan Mattejat and Zinaida Benenson. 2016. All your bulbs are belong to us: Investigating the current state of security in connected lighting systems. arXiv preprint arXiv:1608.03732(2016).  Philipp Morgner Stephan Mattejat and Zinaida Benenson. 2016. All your bulbs are belong to us: Investigating the current state of security in connected lighting systems. arXiv preprint arXiv:1608.03732(2016)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098254"},{"key":"e_1_3_2_1_42_1","unstructured":"Madanlal Musuvathi Dawson\u00a0R Engler 2004. Model Checking Large Network Protocol Implementations.. In NSDI Vol.\u00a04. 12\u201312.  Madanlal Musuvathi Dawson\u00a0R Engler 2004. Model Checking Large Network Protocol Implementations.. In NSDI Vol.\u00a04. 12\u201312."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357178"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/11691617_14"},{"key":"e_1_3_2_1_45_1","unstructured":"Peter. 2016. Extract Philips Hue\u2019s customized keys through reverse engineering. https:\/\/linproxy.fan.workers.dev:443\/https\/peeveeone.com\/?p=166  Peter. 2016. Extract Philips Hue\u2019s customized keys through reverse engineering. https:\/\/linproxy.fan.workers.dev:443\/https\/peeveeone.com\/?p=166"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3034128"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"e_1_3_2_1_48_1","volume-title":"ZIGBEE SECURITY: BASICS (PART 3). https:\/\/linproxy.fan.workers.dev:443\/https\/research.kudelskisecurity.com\/2017\/11\/21\/zigbee-security-basics-part-3\/.","author":"Rudresh Vishruta","year":"2017","unstructured":"Vishruta Rudresh . 2017 . ZIGBEE SECURITY: BASICS (PART 3). https:\/\/linproxy.fan.workers.dev:443\/https\/research.kudelskisecurity.com\/2017\/11\/21\/zigbee-security-basics-part-3\/. Vishruta Rudresh. 2017. ZIGBEE SECURITY: BASICS (PART 3). https:\/\/linproxy.fan.workers.dev:443\/https\/research.kudelskisecurity.com\/2017\/11\/21\/zigbee-security-basics-part-3\/."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813608"},{"key":"e_1_3_2_1_50_1","unstructured":"SmartThings. [n.d.]. SmartThings Public GitHub Repo. https:\/\/linproxy.fan.workers.dev:443\/https\/github.com\/SmartThingsCommunity\/SmartThingsPublic  SmartThings. [n.d.]. SmartThings Public GitHub Repo. https:\/\/linproxy.fan.workers.dev:443\/https\/github.com\/SmartThingsCommunity\/SmartThingsPublic"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345662"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399349"},{"key":"e_1_3_2_1_53_1","volume-title":"11th ToorCon conference","author":"Wright Joshua","year":"2009","unstructured":"Joshua Wright . 2009 . Killerbee: practical zigbee exploitation framework . In 11th ToorCon conference , San Diego, Vol.\u00a067. Joshua Wright. 2009. Killerbee: practical zigbee exploitation framework. In 11th ToorCon conference, San Diego, Vol.\u00a067."},{"key":"e_1_3_2_1_54_1","volume-title":"Smartverif: Push the limit of automation capability of verifying security protocols by dynamic strategies. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 253\u2013270.","author":"Xiong Yan","year":"2020","unstructured":"Yan Xiong , Cheng Su , Wenchao Huang , Fuyou Miao , Wansen Wang , and Hengyi Ouyang . 2020 . Smartverif: Push the limit of automation capability of verifying security protocols by dynamic strategies. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 253\u2013270. Yan Xiong, Cheng Su, Wenchao Huang, Fuyou Miao, Wansen Wang, and Hengyi Ouyang. 2020. Smartverif: Push the limit of automation capability of verifying security protocols by dynamic strategies. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 253\u2013270."},{"volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20). 1183\u20131200.","author":"Yuan Bin","key":"e_1_3_2_1_55_1","unstructured":"Bin Yuan , Yan Jia , Luyi Xing , Dongfang Zhao , XiaoFeng Wang , and Yuqing Zhang . 2020. Shattered chain of trust: Understanding security risks in cross-cloud iot access delegation . In 29th {USENIX} Security Symposium ({USENIX} Security 20). 1183\u20131200. Bin Yuan, Yan Jia, Luyi Xing, Dongfang Zhao, XiaoFeng Wang, and Yuqing Zhang. 2020. Shattered chain of trust: Understanding security risks in cross-cloud iot access delegation. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 1183\u20131200."},{"key":"e_1_3_2_1_56_1","unstructured":"Tobias Zillner and Sebastian Strobl. 2015. ZigBee Exploited\u2013The good the bad and the ugly. Black Hat\u20132015. Available online: https:\/\/linproxy.fan.workers.dev:443\/https\/www. blackhat. com\/docs\/us-15\/materials\/us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly. pdf (accessed on 21 March 2018) (2015).  Tobias Zillner and Sebastian Strobl. 2015. ZigBee Exploited\u2013The good the bad and the ugly. Black Hat\u20132015. Available online: https:\/\/linproxy.fan.workers.dev:443\/https\/www. blackhat. com\/docs\/us-15\/materials\/us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly. pdf (accessed on 21 March 2018) (2015)."}],"event":{"name":"RAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2022","location":"Limassol Cyprus"},"container-title":["Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3545948.3545953","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/3545948.3545953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:27Z","timestamp":1750188627000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3545948.3545953"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":56,"alternative-id":["10.1145\/3545948.3545953","10.1145\/3545948"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/3545948.3545953","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}