{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:36:08Z","timestamp":1725474968705},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540360148"},{"type":"electronic","value":"9783540360179"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11790754_6","type":"book-chapter","created":{"date-parts":[[2006,11,27]],"date-time":"2006-11-27T08:02:37Z","timestamp":1164614557000},"page":"91-108","source":"Crossref","is-referenced-by-count":30,"title":["Using Labeling to Prevent Cross-Service Attacks Against Smart Phones"],"prefix":"10.1007","author":[{"given":"Collin","family":"Mulliner","sequence":"first","affiliation":[]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[]},{"given":"David","family":"Dagon","sequence":"additional","affiliation":[]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Airscanner Corp. Advisory 05081102 vxFtpSrv 0.9.7 Remote Code Execution Vulnerability (2005), http:\/\/www.airscanner.com\/security\/05081102_vxftpsrv.htm"},{"key":"6_CR2","unstructured":"Airscanner Corp. Advisory 05081203 vxTftpSrv 1.7.0 Remote Code Execution Vulnerability (2005), http:\/\/www.airscanner.com\/security\/05081203_vxtftpsrv.htm"},{"key":"6_CR3","unstructured":"Biba, K.: Integrity Considerations for Secure Computer Systems. Technical Report TR-3153, MITRE Corp, Bedford, MA (1977)"},{"key":"6_CR4","unstructured":"Bluetooth SIG: Bluetooth (2006), http:\/\/www.bluetooth.org"},{"key":"6_CR5","unstructured":"Cowan, C., Pu, C., Maier, D.: StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In: Proceedings of the 7th USENIX Security Symposium, pp. 63\u201378 (1998)"},{"key":"6_CR6","unstructured":"Elser, D.: PicoWebServer Remote Unicode Stack Overflow Vulnerability (May 2005), http:\/\/seclists.org\/lists\/bugtraq\/2005\/May\/0333.html"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Dagon, D., Martin, T., Starner, T.: Mobile Phones as Computing Devices: The Viruses are Coming! IEEE Pervasive Computing (October\/December 2004)","DOI":"10.1109\/MPRV.2004.21"},{"key":"6_CR8","unstructured":"Ito, E.: FtpSvr - Ftp Server (1999), http:\/\/www.oohito.com\/wince\/arm_j.htm"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Edjlali, G., Acharya, A., Chaudhary, V.: History-based Access Control for Mobile Code. In: ACM Conference on Computer and Communication Security (1998)","DOI":"10.1145\/288090.288102"},{"key":"6_CR10","unstructured":"F-Secure Corporation. F-Secure Virus Descriptions: Skulls (2004), http:\/\/www.f-secure.com\/v-descs\/skulls.shtml"},{"key":"6_CR11","unstructured":"Familiar Linux - A Linux Distribution For Handheld Devices (2006), http:\/\/familiar.handhelds.org\/"},{"key":"6_CR12","unstructured":"Fraser, T.: LOMAC: MAC you can live with. In: Proc. of the 2001 Usenix Annual Technical Conference (June 2001)"},{"key":"6_CR13","unstructured":"GSMA. GPRS - General Packet Radio Service (2006), http:\/\/www.gsmworld.com"},{"key":"6_CR14","unstructured":"GSMA. GSM - Global System for Mobile Communications (2006), http:\/\/gsmworld.com"},{"key":"6_CR15","unstructured":"Hewlett-Packard. HP iPAQ h5500 (2006), http:\/\/welcome.hp.com\/country\/us\/en\/prodserv\/handheld.html"},{"key":"6_CR16","unstructured":"HTC. HTC Blue Angel (2006), http:\/\/www.htc.com.tw"},{"key":"6_CR17","unstructured":"i-mate. i-mate PDA2k (2006), http:\/\/imate.com\/t-DETAILSP_DA2K.aspx"},{"key":"6_CR18","volume-title":"The Shellcoder\u2019s Handbook: Discovering and Exploiting Security Holes","author":"J. Koziol","year":"2003","unstructured":"Koziol, J., Litchfield, D., Aitel, D., Anley, C., Eren, S., Mehta, N., Hassell, R.: The Shellcoder\u2019s Handbook: Discovering and Exploiting Security Holes. Wiley, Chichester (2003)"},{"key":"6_CR19","unstructured":"Loscocco, P., Smalley, S.: Integrating Exible Support For Security Policies Into The Linux Operating System. In: Proceedings of the FREENIX Track of the 2001 USENIX Annual Technical Conference (2001)"},{"key":"6_CR20","unstructured":"Microsoft. Platform Builder for WindowsCE 5.0, Compiler Option Reference (2005), http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/enus\/wcepbguide5\/html\/wce50congs-enablesecuritychecks.asp"},{"key":"6_CR21","unstructured":"Microsoft. Microsoft WindowsCE .NET 4.2 Platform, Memory Architecture (2006), http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/enus\/wcemain4\/html\/_wcesdk_windows_ce_memory_architecture.asp"},{"key":"6_CR22","unstructured":"Microsoft. Windows Mobile (2006), http:\/\/www.microsoft.com\/windowsmobile\/pocketpc\/"},{"key":"6_CR23","unstructured":"Newmad Technologies AB. PicoWebServer (2005), http:\/\/www.newmad.se\/rnd-freesw-pico.htm"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. RFC3261 (2002)","DOI":"10.17487\/rfc3261"},{"key":"6_CR25","unstructured":"Christensen, M.T.S.N., Sorensen, K.: Umbrella - We can\u2019t prevent the rain. -But we don\u2019t get wet! Master\u2019s thesis, Aalborg University (January 2005)"},{"issue":"1","key":"6_CR26","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-Based Information-Flow Security. IEEE Journal on Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"6_CR27","unstructured":"San. Hacking Windows CE. Phrack, 0x0b(0x3f) (August 2005)"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST Model for Role-Based Access Control: Towards A Unified Standard. In: Proceedings of the fifth ACM workshop on Role-based access control, pp. 47\u201363 (2000)","DOI":"10.1145\/344287.344301"},{"key":"6_CR29","unstructured":"SecurityFocus. BugTraq (2006), http:\/\/www.securityfocus.com\/archive"},{"key":"6_CR30","unstructured":"SJ Labs, Inc. Voice Over IP Software (2005), http:\/\/www.sjlabs.com"},{"key":"6_CR31","unstructured":"Symantec Security Response. SymbOS.Cabir (2004), http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/epoc.cabir.html"},{"key":"6_CR32","unstructured":"Symbian, Inc. Information about Mosquitos Trojan (2004), http:\/\/www.symbian.com\/press-office\/2004\/pr040810.html"},{"key":"6_CR33","unstructured":"Vieka Technology Inc. PE FTP Server (2005), http:\/\/www.vieka.com\/peftpd.htm"},{"key":"6_CR34","unstructured":"Watson, R.N.M.: TrustedBSD: Adding Trusted Operating System Features to FreeBSD. In: USENIX Annual Technical Conference, FREENIX Track, pp. 15\u201328 (2001)"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware &amp; Vulnerability Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11790754_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:23:14Z","timestamp":1619493794000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11790754_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540360148","9783540360179"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/11790754_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}