Books & Videos

Table of Contents

  1. Chapter 1 Lights Out—Hacking Wireless Lightbulbs to Cause Sustained Blackouts

    1. Why hue?

    2. Controlling Lights via the Website Interface

    3. Controlling Lights Using the iOS App

    4. Changing Lightbulb State

    5. If This Then That (IFTTT)

    6. Conclusion

  2. Chapter 2 Electronic Lock Picking—Abusing Door Locks to Compromise Physical Security

    1. Hotel Door Locks and Magnetic Stripes

    2. The Case of Z-Wave-Enabled Door Locks

    3. Bluetooth Low Energy and Unlocking via Mobile Apps

    4. Conclusion

  3. Chapter 3 Assaulting the Radio Nurse—Breaching Baby Monitors and One Other Thing

    1. The Foscam Incident

    2. The Belkin WeMo Baby Monitor

    3. Some Things Never Change: The WeMo Switch

    4. Conclusion

  4. Chapter 4 Blurred Lines—When the Physical Space Meets the Virtual Space

    1. SmartThings

    2. Interoperability with Insecurity Leads to…Insecurity

    3. Conclusion

  5. Chapter 5 The Idiot Box—Attacking “Smart” Televisions

    1. The TOCTTOU Attack

    2. You Call That Encryption?

    3. Understanding and Exploiting the App World

    4. Inspecting Your Own Smart TV (and Other IoT Devices)

    5. Conclusion

  6. Chapter 6 Connected Car Security Analysis—From Gas to Fully Electric

    1. The Tire Pressure Monitoring System (TPMS)

    2. Exploiting Wireless Connectivity

    3. The Tesla Model S

    4. Conclusion

  7. Chapter 7 Secure Prototyping—littleBits and cloudBit

    1. Introducing the cloudBit Starter Kit

    2. Security Evaluation

    3. Abuse Cases in the Context of Threat Agents

    4. Bug Bounty Programs

    5. Conclusion

  8. Chapter 8 Securely Enabling Our Future—A Conversation on Upcoming Attack Vectors

    1. The Thingbots Have Arrived

    2. The Rise of the Drones

    3. Cross-Device Attacks

    4. Hearing Voices

    5. IoT Cloud Infrastructure Attacks

    6. Backdoors

    7. The Lurking Heartbleed

    8. Diluting the Medical Record

    9. The Data Tsunami

    10. Targeting Smart Cities

    11. Interspace Communication Will Be a Ripe Target

    12. The Dangers of Superintelligence

    13. Conclusion

  9. Chapter 9 Two Scenarios—Intentions and Outcomes

    1. The Cost of a Free Beverage

    2. A Case of Anger, Denial, and Self-Destruction

    3. Conclusion