Attack Videos and Traffic Logs

1. Capacity Exploitation Attack

The following video shows the process of the Capacity Exploitation. It also shows the damaging impact of such a vulnerability: Legitimate devices cannot be accepted to the Zigbee network anymore.

2. Offline Attack

The following video shows the process of the Offline Attack. It also shows the damaging impact of such a vulnerability: Connected Zigbee devices can be triggered to go offline and lose their functionalities.

3. Network Key Leakage Attack

The following video shows the process of the Network Key Leakage Attack. It also shows the damaging impact of such a vulnerability: The whole Zigbee network is compromised.

Specifically, in this video, we show that attackers can get complete control of a legitimate smart plug in the compromised network.

4. Hijacking Attack and Captured Traffic Logs

For the Hijacking Attack, we provide the captured traffic log file which shows the process of hijacking a Philips Hue dimmer switch.

https://drive.google.com/drive/folders/16IhESDk6aGJJDAJQVFfKnJmZ2Vh6RGtU?usp=sharing

The following link contains the traffic log files for all vulnerabilities mentioned above.

https://drive.google.com/drive/folders/1-oDXiv0mSIJPoSitOEN33ovcXwrTeK3S?usp=sharing