{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:06:44Z","timestamp":1755839204664,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030884178"},{"type":"electronic","value":"9783030884185"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-88418-5_7","type":"book-chapter","created":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T21:04:30Z","timestamp":1632949470000},"page":"133-151","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["ARIstoteles \u2013 Dissecting Apple\u2019s Baseband Interface"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Kr\u00f6ll","sequence":"first","affiliation":[]},{"given":"Stephan","family":"Kleber","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[]},{"given":"Jiska","family":"Classen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,30]]},"reference":[{"key":"7_CR1","unstructured":"Afek, J.: Simplifying iOS research: booting the iOS kernel to an interactive bash shell on QEMU (2020). https:\/\/www.offensivecon.org\/speakers\/2020\/jonathan-afek.html"},{"key":"7_CR2","unstructured":"Android Open Source Project: RIL Refactoring (2021). https:\/\/source.android.com\/devices\/tech\/connect\/ril"},{"key":"7_CR3","unstructured":"Apple: Profiles and Logs - Bug Reporting - Apple Developer (2021). https:\/\/developer.apple.com\/bug-reporting\/profiles-and-logs\/"},{"key":"7_CR4","unstructured":"Corellium: Introduction to iOS Devices (2021). https:\/\/support.corellium.com\/hc\/en-us\/articles\/360053569554-Introduction-to-iOS-Devices"},{"key":"7_CR5","unstructured":"Golde, N.: There\u2019s Life in the Old Dog Yet: Tearing New Holes into Intel\/iPhone Cellular Modems (2018). https:\/\/comsecuris.com\/blog\/posts\/theres_life_in_the_old_dog_yet_tearing_new_holes_into_inteliphone_cellular_modems\/"},{"key":"7_CR6","unstructured":"Guy: Burned in Ashes: Baseband Fairy Tale Stories (2019). https:\/\/cfp.recon.cx\/reconmtl2019\/talk\/7A7TBA\/"},{"key":"7_CR7","unstructured":"Heinze, D.: fpicker (2021). https:\/\/github.com\/ttdennis\/fpicker"},{"key":"7_CR8","unstructured":"Heinze, D., Classen, J., Hollick, M.: ToothPicker: apple picking in the iOS Bluetooth Stack. In: 14th USENIX Workshop on Offensive Technologies (WOOT 20). USENIX Association (2020). https:\/\/www.usenix.org\/conference\/woot20\/presentation\/heinze"},{"key":"7_CR9","unstructured":"Hernandez, G., Muench, M.: Emulating Samsung\u2019s Baseband for Security Testing. BlackHat USA 2020 (2020)"},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Kleber, S., van der Heijden, R.W., Kargl, F.: Message type identification of binary network protocols using continuous segment similarity. In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, pp. 2243\u20132252 (2020). https:\/\/doi.org\/10.1109\/INFOCOM41043.2020.9155275","DOI":"10.1109\/INFOCOM41043.2020.9155275"},{"key":"7_CR11","unstructured":"Kleber, S., Kopp, H., Kargl, F.: NEMESYS: network message syntax reverse engineering by analysis of the intrinsic structure of individual messages. In: 12th USENIX Workshop on Offensive Technologies (WOOT 18). USENIX Association, Baltimore (2018)"},{"key":"7_CR12","unstructured":"libqmi Developers: QMI modem protocol helper library (2021). https:\/\/github.com\/freedesktop\/libqmi"},{"key":"7_CR13","unstructured":"Liu, B., Zhang, C., Gong, G., Zeng, Y., Ruan, H., Zhuge, J.: FANS: fuzzing android native system services via automated interface analysis. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 307\u2013323. USENIX Association (2020). https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/liu"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Maier, D., Seidel, L., Park, S.: BaseSAFE: baseband sanitized fuzzing through emulation. In: The 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec \u201920) (2020)","DOI":"10.1145\/3395351.3399360"},{"key":"7_CR15","doi-asserted-by":"publisher","unstructured":"Mantz, D., Classen, J., Schulz, M., Hollick, M.: InternalBlue - bluetooth binary patching and experimentation framework. In: The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys \u201919) (2019). https:\/\/doi.org\/10.1145\/3307334.3326089","DOI":"10.1145\/3307334.3326089"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Muench, M., Stijohann, J., Kargl, F., Francillon, A., Balzarotti, D.: What you corrupt is not what you crash: challenges in fuzzing embedded devices. In: 25th Annual Network and Distributed System Security Symposium (NDSS 2018). The Internet Society (2018)","DOI":"10.14722\/ndss.2018.23166"},{"key":"7_CR17","unstructured":"Mulliner, C.: Fuzzing the phone in your phone. https:\/\/media.ccc.de\/v\/26c3-3507-de-fuzzing_the_phone_in_your_phone"},{"key":"7_CR18","unstructured":"Mulliner, C., Miller, C.: Fuzzing the phone in your phone. https:\/\/www.blackhat.com\/presentations\/bh-usa-09\/MILLER\/BHUSA09-Miller-FuzzingPhone-PAPER.pdf"},{"key":"7_CR19","unstructured":"National Security Agency: Ghidra (2021). https:\/\/ghidra-sre.org\/"},{"key":"7_CR20","unstructured":"Ravn\u00e5s, O.A.V.: Frida - a world-class dynamic instrumentation framework (2020). https:\/\/frida.re\/"},{"key":"7_CR21","unstructured":"Ravn\u00e5s, O.A.V.: Frida - stalker (2020). https:\/\/frida.re\/docs\/stalker\/"},{"key":"7_CR22","unstructured":"Ruge, J., Classen, J., Gringoli, F., Hollick, M.: Frankenstein: advanced wireless fuzzing to exploit new bluetooth escalation targets. In: 29th USENIX Security Symposium (USENIX Security 19). USENIX Association (2020)"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Schulz, M., Wegemer, D., Hollick, M.: Nexmon: the C-based firmware patching framework (2017). https:\/\/nexmon.org","DOI":"10.1145\/3131473.3131476"},{"key":"7_CR24","unstructured":"scikit-learn Developers: sklearn.mainfold.MDS - scikit-learn 0.24.2 documentation (2021). https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.manifold.MDS.html"},{"key":"7_CR25","unstructured":"Silvanovich, N.: iOS Messaging Tools (2019). https:\/\/github.com\/googleprojectzero\/iOS-messaging-tools"},{"key":"7_CR26","unstructured":"Stone, M.: Bad binder: android in-the-wild exploit (2019). https:\/\/googleprojectzero.blogspot.com\/2019\/11\/bad-binder-android-in-wild-exploit.html"},{"key":"7_CR27","unstructured":"Stute, M., et al.: A billion open interfaces for eve and mallory: MitM, DoS, and tracking attacks on iOS and macOS through apple wireless direct link. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 37\u201354. USENIX Association, Santa Clara (2019)"},{"key":"7_CR28","unstructured":"Wireshark Foundation: Wireshark (2021). https:\/\/www.wireshark.org\/"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-88418-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T21:11:08Z","timestamp":1632949868000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-88418-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030884178","9783030884185"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-88418-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"30 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Darmstadt","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2021.athene-center.de\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"351","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.07","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.06","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}