attacker-server

attacker-server

Figure 4: Device registering to attacker’s server