100 5.3.2 Les couches hautes, p.104 ,
Modifier et personnaliser la box de sfr ,
Conceptual model and architecture of maftia, 2003. ,
Fault tolerance : principles and practice, 1981. ,
La web 2.0 -definición. https://web.archive.org/web, 2007. ,
Design of fault-tolerant computers, Proceedings of the November 14-16, 1967, fall joint computer conference on, AFIPS '67 (Fall), pp.733-743, 1967. ,
DOI : 10.1145/1465611.1465708
Smart-TV Security Analysis: Practical Experiments, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015. ,
DOI : 10.1109/DSN.2015.41
URL : https://hal.archives-ouvertes.fr/hal-01178553
Analyse de sécurité des box adsl, Symposium sur la sécurité des technologies de l'information et des communications, p.15, 2014. ,
La sécurité des box adsl : analyse de risques et éxpériementations. Ingénierie des systèmes d'information, pp.63-88, 2014. ,
Security of ISP Access Networks: Practical Experiments, 2015 11th European Dependable Computing Conference (EDCC), 2015. ,
DOI : 10.1109/EDCC.2015.27
URL : https://hal.archives-ouvertes.fr/hal-01190054
Protocole hbbtv et sécurité : quelques expérimentations, Symposium sur la sécurité des technologies de l'information et des communications, p.13, 2015. ,
Sécurité des ordivisions, proc. of Symposium sur la sécurité des technologies de l'information et des communications (SSTIC), pp.23-24, 2014. ,
Télévisions connectées : Des objets branchés sécurité ? Multi-System and Internet Security Cookbook (MISC), pp.23-24, 2014. ,
The Semantic Web, Scientific American, vol.284, issue.5, pp.28-37, 2001. ,
DOI : 10.1038/scientificamerican0501-34
The final nail in WEP's coffin, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.15-400, 2006. ,
DOI : 10.1109/SP.2006.40
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.162.1266
Dvb-t implementation in gnuradio ? part 2 ,
XCS, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.420-431, 2009. ,
DOI : 10.1145/1653662.1653713
Port scanning /0 using insecure embedded devices ,
Objets communicants et Internet des objets, 2011. ,
Improving the Information Security Risk Assessment Process. http://www.cert.org/downloads/octave- allegro/OCTAVE-AllegroMethod-v10.pdf, 2007. ,
An MPEG-4 IPMPX Design and Implementation on MPEG-21 Test Bed, 2005 IEEE International Symposium on Circuits and Systems, pp.4550-4553, 2005. ,
DOI : 10.1109/ISCAS.2005.1465644
Broadcasting System Compliant with MPEG-2/4 IPMPX, ETRI Journal, vol.26, issue.2, pp.83-91, 2004. ,
DOI : 10.4218/etrij.04.0603.0002
Special eurobarometer 396 -e-communications household survey. http://ec.europa.eu/digital-agenda/en/news/special- eurobarometer-396-e-communications-household-survey, pp.2013-2015 ,
A large scale analysis of the security of embedded firmwares, USENIX Security. USENIX Association, pp.2014-2035 ,
JavaScript : The Good Parts, 2008. ,
Brave New World: Pervasive Insecurity of Embedded Network Devices, Recent Advances in Intrusion Detection, pp.378-380, 2009. ,
DOI : 10.1007/978-3-642-04342-0_32
A quantitative analysis of the insecurity of embedded network devices, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.97-106, 2010. ,
DOI : 10.1145/1920261.1920276
The design of Rijndael : AES-the advanced encryption standard, 2002. ,
DOI : 10.1007/978-3-662-04722-4
La sécurité des systèmes d'information et de communication, 2006. ,
Tor : The second-generation onion router, 2004. ,
TVs logging USB filenames and viewing info to LG serverslg-smart- tvs-logging-usb-filenames-and.html, pp.90-91, 2013. ,
DDoS attacks and defense mechanisms: classification and state-of-the-art, Computer Networks, vol.44, issue.5, pp.643-666, 2004. ,
DOI : 10.1016/j.comnet.2003.10.003
The Matter of Heartbleed, Proceedings of the 2014 Conference on Internet Measurement Conference, IMC '14, pp.475-488, 2014. ,
DOI : 10.1145/2663716.2663755
The ip network address translator (nat) http: //www.hjp.at/doc/rfc/rfc1631.html, 1994. ,
The smart fridge ,
ETSI TS 102 796 V1.2.1, 2012. ,
SOHO Network Equipment and the implications of a rich service set. https://securityevaluators.com/knowledge/ case_studies/routers/soho_techreport.pdf, pp.2013-2015 ,
Management de la sécurité de l'information : Implémentation ISO 27001 -Mise en place d'un SMSI et audit de certification, 2009. ,
Newsmaker : Portals in space. https://web.archive.org/ web, 2003. ,
Measurements on the MPEG-2 Transport Stream, Digital Video and Audio Broadcasting Technology, Signals and Communication Technology, pp.179-195, 2008. ,
Web 3.0, web sémantique, internet des objets ,
A privacy protection system for HbbTV in Smart TVs, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp.357-362, 2014. ,
DOI : 10.1109/CCNC.2014.6866595
Verifying Security, ACM Computing Surveys, vol.13, issue.3, pp.279-339, 1981. ,
DOI : 10.1145/356850.356853
Reverse Engineering a D-Link Backdoor, 2013. ,
Ping of Death. http://insecure.org/sploits/ping-o-death. html, 1996. ,
Apache Range Header DoS (Apache Killer). https://web.archive.org/web, pp.2011-2015 ,
La brosse à dents Kolibree, le compagnon efficace et agréable d'une bonne hygiène dentaire pour toute la famille ,
Smart tv hacking : Crash testing your home entertainment. Codenomicon Whitepaper, pp.2012-2033 ,
Etat de l'art de la securité sur ATM, De Nouvelles Architectures pour les Communications (DNAC'96)Cité en page 105, pp.323-341, 1996. ,
Des décodeurs pirates (DreamBox, Samsat) pour regarder Canal+, CanalSat, BeinSport. http://www.le-bon-plan.com/decodeurspirates-dreambox-samsat-regarder-canal-canalsat-beinsport .html, pp.2014-2015 ,
Brouilleur de téléphone, le gadget interdit. http:// www.tomsguide.fr/article/brouilleur-ondes-3G-GSM-smartphone,2- 896.html, 2013. ,
SSL/TLS : état des lieux et recommandations In proc. of Symposium sur la sécurité des technologies de l'information et des communications (SSTIC), 2012. ,
Full Disclosure ASUS Wireless Routers Ten Models -Multiple Vulnerabilities on AiCloud enabled units. http://www.securityfocus.com/ archive, pp.2013-2015, 527275. ,
La Sense Mother, l'appareil qui se connecte au quotidien . http://www.tom.travel/2014/07/la-sense-mother-lappareil- qui-se-connecte-au-quotidien, pp.2014-2015 ,
Gestion des risques en sécurité de l'information : mise en oeuvre de la norme ISO 27005 (Cité en page 36.) [75] E. Messmer. Massive DDoS attacks a growing threat to VoIP services . http://www.networkworld.com/article/2181743/voip/massive- ddos-attacks-a-growing-threat-to-voip-services.html, pp.2011-2015, 2010. ,
A man-in-the-middle attack on UMTS, Proceedings of the 2004 ACM workshop on Wireless security , WiSe '04, pp.90-97, 2004. ,
DOI : 10.1145/1023646.1023662
Security Flaws in Universal Plug and Play : Unplug. don't play ,
Petite définition du Web 2.0. http://pro.01net.com, 2009. ,
Web 2.0 : Compact definition ? http://radar.oreilly.com, 2005. ,
What Is Web 2.0. http://www.oreilly.com/pub, 2005. ,
From the aether to the ethernet?attacking the internet using broadcast digital television, 23rd USENIX Security Symposium (USENIX Security 14), pp.353-368, 2014. ,
Web 3.0 : définitions. http://pisani.blog.lemonde.fr, 2007. ,
The same origin policy. https://developer.mozilla.org/ fr, 2001. ,
Sécurité de l'ADSL en France In proc. of Symposium sur la sécurité des technologies de l'information et des communications (SSTIC), 2006. ,
http://sekurak.pl/tp-linkhttptftp-backdoor, p.2012 ,
Eric Schmidt Defines Web 3.0. http://readwrite.com, 2007. ,
Smart-TV Hacking, 2013. ,
SIP Password Security -How much is yours worth ? http:// www.sipsorcery.com/mainsite ,
The Anonymous WikiLeaks protests are a mass demo against control. http://www.theguardian.com/commentisfree, pp.2010-2015, 2010. ,
Drive-By Pharming, Information and Communications Security, pp.495-506 ,
DOI : 10.1007/978-3-540-77048-0_38
The DVB Terrestrial (DVB-T) specification and its implementation in a practical modem, International Broadcasting Convention (IBC) ,
DOI : 10.1049/cp:19960816
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP, NDSS, 2002. ,
Brute forcing WiFi protected setup. Wi-Fi Protected Setup, pp.2011-2037 ,
http:// lafibre.info/techno-du-web/pppoa-pppoe-ipoa-ipoe, 2011. ,
How to Break MD5 and Other Hash Functions, Advances in Cryptology?EUROCRYPT 2005, pp.19-35, 2005. ,
DOI : 10.1007/11426639_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.6718
Network Address Translation: Extending the Internet Address Space, IEEE Internet Computing, vol.14, issue.4, pp.66-70, 2010. ,
DOI : 10.1109/MIC.2010.96
The exploration and exploitation of an sd memory card, proc. of 30th Chaos Communication Congress (30C3) ,
OSI Reference Model--The ISO Model of Architecture for Open Systems Interconnection, IEEE Transactions on Communications, vol.28, issue.4, pp.425-432, 1980. ,
DOI : 10.1109/TCOM.1980.1094702