P. Pile-de, 100 5.3.2 Les couches hautes, p.104

. Openbox4, Modifier et personnaliser la box de sfr

A. Adelsbach, C. Cachin, S. Creese, Y. Deswarte, K. Kursawe et al., Conceptual model and architecture of maftia, 2003.

T. W. Anderson and P. A. Lee, Fault tolerance : principles and practice, 1981.

O. Antolinez, La web 2.0 -definición. https://web.archive.org/web, 2007.

A. Avi?ienis, Design of fault-tolerant computers, Proceedings of the November 14-16, 1967, fall joint computer conference on, AFIPS '67 (Fall), pp.733-743, 1967.
DOI : 10.1145/1465611.1465708

Y. Bachy, F. Basse, V. Nicomette, E. Alata, M. Kaâniche et al., Smart-TV Security Analysis: Practical Experiments, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015.
DOI : 10.1109/DSN.2015.41

URL : https://hal.archives-ouvertes.fr/hal-01178553

Y. Bachy, V. Nicomette, E. Alata, Y. Deswarte, M. Kaâniche et al., Analyse de sécurité des box adsl, Symposium sur la sécurité des technologies de l'information et des communications, p.15, 2014.

Y. Bachy, V. Nicomette, E. Alata, M. Kaâniche, and J. Courrège, La sécurité des box adsl : analyse de risques et éxpériementations. Ingénierie des systèmes d'information, pp.63-88, 2014.

Y. Bachy, V. Nicomette, E. Alata, M. Kaâniche, and J. Courrège, Security of ISP Access Networks: Practical Experiments, 2015 11th European Dependable Computing Conference (EDCC), 2015.
DOI : 10.1109/EDCC.2015.27

URL : https://hal.archives-ouvertes.fr/hal-01190054

Y. Bachy, V. Nicomette, E. Alata, M. Kaâniche, J. Courrège et al., Protocole hbbtv et sécurité : quelques expérimentations, Symposium sur la sécurité des technologies de l'information et des communications, p.13, 2015.

F. Basse, Sécurité des ordivisions, proc. of Symposium sur la sécurité des technologies de l'information et des communications (SSTIC), pp.23-24, 2014.

F. Basse, Télévisions connectées : Des objets branchés sécurité ? Multi-System and Internet Security Cookbook (MISC), pp.23-24, 2014.

T. Berners-lee, J. Hendler, and O. Lassila, The Semantic Web, Scientific American, vol.284, issue.5, pp.28-37, 2001.
DOI : 10.1038/scientificamerican0501-34

A. Bittau, M. Handley, and J. Lackey, The final nail in WEP's coffin, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.15-400, 2006.
DOI : 10.1109/SP.2006.40

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.162.1266

. Bogdan, Dvb-t implementation in gnuradio ? part 2

H. Bojinov, E. Bursztein, and D. Boneh, XCS, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.420-431, 2009.
DOI : 10.1145/1653662.1653713

C. Botnet, Port scanning /0 using insecure embedded devices

I. Carnot, Objets communicants et Internet des objets, 2011.

C. Introducing and O. Allegro, Improving the Information Security Risk Assessment Process. http://www.cert.org/downloads/octave- allegro/OCTAVE-AllegroMethod-v10.pdf, 2007.

F. Chen-wei, C. Feng-cheng, and H. Hsueh-ming, An MPEG-4 IPMPX Design and Implementation on MPEG-21 Test Bed, 2005 IEEE International Symposium on Circuits and Systems, pp.4550-4553, 2005.
DOI : 10.1109/ISCAS.2005.1465644

Y. Cho, J. Seok, J. Hong, and C. Ahn, Broadcasting System Compliant with MPEG-2/4 IPMPX, ETRI Journal, vol.26, issue.2, pp.83-91, 2004.
DOI : 10.4218/etrij.04.0603.0002

E. Commission, Special eurobarometer 396 -e-communications household survey. http://ec.europa.eu/digital-agenda/en/news/special- eurobarometer-396-e-communications-household-survey, pp.2013-2015

A. Costin, J. Zaddach, A. Francillon, and D. Balzarotti, A large scale analysis of the security of embedded firmwares, USENIX Security. USENIX Association, pp.2014-2035

D. Crockford, JavaScript : The Good Parts, 2008.

A. Cui, Y. Song, P. V. Prabhu, and S. J. Stolfo, Brave New World: Pervasive Insecurity of Embedded Network Devices, Recent Advances in Intrusion Detection, pp.378-380, 2009.
DOI : 10.1007/978-3-642-04342-0_32

A. Cui and S. J. Stolfo, A quantitative analysis of the insecurity of embedded network devices, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.97-106, 2010.
DOI : 10.1145/1920261.1920276

J. Daemen and V. Rijmen, The design of Rijndael : AES-the advanced encryption standard, 2002.
DOI : 10.1007/978-3-662-04722-4

Y. Deswarte, La sécurité des systèmes d'information et de communication, 2006.

R. Dingledine, N. Mathewson, and P. Syverson, Tor : The second-generation onion router, 2004.

. Doctorbeet and . Smart, TVs logging USB filenames and viewing info to LG serverslg-smart- tvs-logging-usb-filenames-and.html, pp.90-91, 2013.

C. Douligeris and A. Mitrokotsa, DDoS attacks and defense mechanisms: classification and state-of-the-art, Computer Networks, vol.44, issue.5, pp.643-666, 2004.
DOI : 10.1016/j.comnet.2003.10.003

Z. Durumeric, J. Kasten, D. Adrian, J. A. Halderman, M. Bailey et al., The Matter of Heartbleed, Proceedings of the 2014 Conference on Internet Measurement Conference, IMC '14, pp.475-488, 2014.
DOI : 10.1145/2663716.2663755

K. Egevang and P. Francis, The ip network address translator (nat) http: //www.hjp.at/doc/rfc/rfc1631.html, 1994.

M. Eoloff, J. Egasti, J. Krall, and K. Kosobucki, The smart fridge

. European-broadcasting-union, ETSI TS 102 796 V1.2.1, 2012.

I. Security and E. , SOHO Network Equipment and the implications of a rich service set. https://securityevaluators.com/knowledge/ case_studies/routers/soho_techreport.pdf, pp.2013-2015

A. Fernandez-toro, Management de la sécurité de l'information : Implémentation ISO 27001 -Mise en place d'un SMSI et audit de certification, 2009.

J. Firmage, Newsmaker : Portals in space. https://web.archive.org/ web, 2003.

W. Fischer, Measurements on the MPEG-2 Transport Stream, Digital Video and Audio Broadcasting Technology, Signals and Communication Technology, pp.179-195, 2008.

P. Gautier, Web 3.0, web sémantique, internet des objets

M. Ghiglieri and E. Tews, A privacy protection system for HbbTV in Smart TVs, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp.357-362, 2014.
DOI : 10.1109/CCNC.2014.6866595

M. H. Cheheyl, M. Gasser, G. A. Huff, and J. K. Millen, Verifying Security, ACM Computing Surveys, vol.13, issue.3, pp.279-339, 1981.
DOI : 10.1145/356850.356853

C. Heffner, Reverse Engineering a D-Link Backdoor, 2013.

M. Kenney, Ping of Death. http://insecure.org/sploits/ping-o-death. html, 1996.

M. Kingcope, M. Fujiwara, and . Neis, Apache Range Header DoS (Apache Killer). https://web.archive.org/web, pp.2011-2015

. Kolibree, La brosse à dents Kolibree, le compagnon efficace et agréable d'une bonne hygiène dentaire pour toute la famille

R. Kuipers, E. Starck, and H. Heikkinen, Smart tv hacking : Crash testing your home entertainment. Codenomicon Whitepaper, pp.2012-2033

M. Laurent and P. Rolin, Etat de l'art de la securité sur ATM, De Nouvelles Architectures pour les Communications (DNAC'96)Cité en page 105, pp.323-341, 1996.

. Le-bon-plan, Des décodeurs pirates (DreamBox, Samsat) pour regarder Canal+, CanalSat, BeinSport. http://www.le-bon-plan.com/decodeurspirates-dreambox-samsat-regarder-canal-canalsat-beinsport .html, pp.2014-2015

E. Le-ricque, Brouilleur de téléphone, le gadget interdit. http:// www.tomsguide.fr/article/brouilleur-ondes-3G-GSM-smartphone,2- 896.html, 2013.

O. Levillain, SSL/TLS : état des lieux et recommandations In proc. of Symposium sur la sécurité des technologies de l'information et des communications (SSTIC), 2012.

K. Lovett, Full Disclosure ASUS Wireless Routers Ten Models -Multiple Vulnerabilities on AiCloud enabled units. http://www.securityfocus.com/ archive, pp.2013-2015, 527275.

J. Luczak-rougeaux, La Sense Mother, l'appareil qui se connecte au quotidien . http://www.tom.travel/2014/07/la-sense-mother-lappareil- qui-se-connecte-au-quotidien, pp.2014-2015

A. Lupfer, Gestion des risques en sécurité de l'information : mise en oeuvre de la norme ISO 27005 (Cité en page 36.) [75] E. Messmer. Massive DDoS attacks a growing threat to VoIP services . http://www.networkworld.com/article/2181743/voip/massive- ddos-attacks-a-growing-threat-to-voip-services.html, pp.2011-2015, 2010.

U. Meyer and S. Wetzel, A man-in-the-middle attack on UMTS, Proceedings of the 2004 ACM workshop on Wireless security , WiSe '04, pp.90-97, 2004.
DOI : 10.1145/1023646.1023662

H. Moore, Security Flaws in Universal Plug and Play : Unplug. don't play

E. Ogez, Petite définition du Web 2.0. http://pro.01net.com, 2009.

T. O. Reilly, Web 2.0 : Compact definition ? http://radar.oreilly.com, 2005.

T. O. Reilly, What Is Web 2.0. http://www.oreilly.com/pub, 2005.

Y. Oren and A. D. Keromytis, From the aether to the ethernet?attacking the internet using broadcast digital television, 23rd USENIX Security Symposium (USENIX Security 14), pp.353-368, 2014.

F. Pisani, Web 3.0 : définitions. http://pisani.blog.lemonde.fr, 2007.

J. Ruderman, The same origin policy. https://developer.mozilla.org/ fr, 2001.

N. Ruff, Sécurité de l'ADSL en France In proc. of Symposium sur la sécurité des technologies de l'information et des communications (SSTIC), 2006.

M. Sajdak, H. Tp-link, and . Tftp-backdoor, http://sekurak.pl/tp-linkhttptftp-backdoor, p.2012

E. Schmidt, Eric Schmidt Defines Web 3.0. http://readwrite.com, 2007.

N. Sidiropoulos and P. Stefopoulos, Smart-TV Hacking, 2013.

. Sipsorcery, SIP Password Security -How much is yours worth ? http:// www.sipsorcery.com/mainsite

]. R. Stallman, The Anonymous WikiLeaks protests are a mass demo against control. http://www.theguardian.com/commentisfree, pp.2010-2015, 2010.

S. Stamm, Z. Ramzan, and M. Jakobsson, Drive-By Pharming, Information and Communications Security, pp.495-506
DOI : 10.1007/978-3-540-77048-0_38

J. H. Stott, The DVB Terrestrial (DVB-T) specification and its implementation in a practical modem, International Broadcasting Convention (IBC)
DOI : 10.1049/cp:19960816

A. Stubblefield, J. Ioannidis, and A. D. Rubin, Using the Fluhrer, Mantin, and Shamir Attack to Break WEP, NDSS, 2002.

S. Viehböck, Brute forcing WiFi protected setup. Wi-Fi Protected Setup, pp.2011-2037

V. Le-retour-du-combat-pppoa, /. Pppoe-vs-ipoa, and /. Ipoe, http:// lafibre.info/techno-du-web/pppoa-pppoe-ipoa-ipoe, 2011.

X. Wang and H. Yu, How to Break MD5 and Other Hash Functions, Advances in Cryptology?EUROCRYPT 2005, pp.19-35, 2005.
DOI : 10.1007/11426639_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.6718

D. Wing, Network Address Translation: Extending the Internet Address Space, IEEE Internet Computing, vol.14, issue.4, pp.66-70, 2010.
DOI : 10.1109/MIC.2010.96

B. Xobs, The exploration and exploitation of an sd memory card, proc. of 30th Chaos Communication Congress (30C3)

H. Zimmermann, OSI Reference Model--The ISO Model of Architecture for Open Systems Interconnection, IEEE Transactions on Communications, vol.28, issue.4, pp.425-432, 1980.
DOI : 10.1109/TCOM.1980.1094702