2018
DOI: 10.1145/3285030
|View full text |Cite
|
Sign up to set email alerts
|

Looking Under the Hood of Z-Wave

Abstract: Z-Wave is a proprietary Internet of Things substrate providing distributed home and office automation services. The proprietary nature of Z-Wave devices makes it difficult to determine their security aptitude. While there are a variety of open source tools for analyzing Z-Wave frames, inspecting non-volatile memory, and disassembling firmware, there are no dynamic analysis tools allowing one to inspect the internal state of a Z-Wave transceiver while it is running. In this work, a memory introspection capabili… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 21 publications
0
1
0
Order By: Relevance
“…There have been many studies to analyze the Z-Wave protocol (e.g., [3], [4], [5], [6], [7], [8], [9], [16], [17], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28]); among these, some focused on the analysis of the Z-Wave traffic. MBIDS [8] analyzed 11 Z-Wave CMDCLs to find misuse cases.…”
Section: Related Work a Research On The Z-wave Protocolmentioning
confidence: 99%
“…There have been many studies to analyze the Z-Wave protocol (e.g., [3], [4], [5], [6], [7], [8], [9], [16], [17], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28]); among these, some focused on the analysis of the Z-Wave traffic. MBIDS [8] analyzed 11 Z-Wave CMDCLs to find misuse cases.…”
Section: Related Work a Research On The Z-wave Protocolmentioning
confidence: 99%
“…Secondly, memory acquisition tools need to load a kernel module on Linux based systems (the most used by IoT devices) and to create a profile of the volatile memory so that it can be examined. These two processes are not feasible at all on IoT devices, so only carrying out a remote analysis of the device will allow the extraction of information from the volatile data [27,14,10].…”
Section: Introductionmentioning
confidence: 99%