Which three loT attack areas as defined by OWASP are true? (Choose three)
A. Ecosystem access control
B. Local device vector injection
C. Remote data storage tempering
D. Local data storage
E. Middleware exploitation
F. Device physical interfaces