DISCOVERING SECURITY WEAKNESSES IN IOT DEVICE SETUP