{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T06:51:21Z","timestamp":1762325481546,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031213328"},{"type":"electronic","value":"9783031213335"}],"license":[{"start":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T00:00:00Z","timestamp":1668988800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T00:00:00Z","timestamp":1668988800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-21333-5_99","type":"book-chapter","created":{"date-parts":[[2022,11,20]],"date-time":"2022-11-20T19:02:43Z","timestamp":1668970963000},"page":"983-994","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Vulnerabilities of the SMS Retriever API for the Automatic Verification of SMS OTP Codes in the Banking Sector"],"prefix":"10.1007","author":[{"given":"Amador","family":"Aparicio","sequence":"first","affiliation":[]},{"given":"M. Mercedes","family":"Mart\u00ednez","sequence":"additional","affiliation":[]},{"given":"Valent\u00edn","family":"Carde\u00f1oso","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,21]]},"reference":[{"key":"99_CR1","doi-asserted-by":"crossref","unstructured":"Lei, Z., Nan, Y., Fratantonio, Y., Bianchi, A.: On the insecurity of SMS one-time password messages against local attackers in modern mobile devices \u2013 NDSS symposium. In: NDDS Symposium (2021). https:\/\/www.ndss-symposium.org\/ndss-paper\/on-the-insecurity-of-sms-one-time-password-messages-against-local-attackers-in-modern-mobile-devices\/","DOI":"10.14722\/ndss.2021.24212"},{"key":"99_CR2","unstructured":"Automatic SMS Verification with the SMS Retriever API. (s. f.). Google Developers. https:\/\/developers.google.com\/identity\/sms-retriever\/overview. Accessed 16 Sept 2021"},{"key":"99_CR3","unstructured":"Subramaniam, M.: No more SMS permission required for SMS verification in Android O+(8+). Medium, May 2019. https:\/\/s-muthukhumar.medium.com\/no-more-sms-permission-required-for-sms-verification-in-android-o-3e9389a1e43e"},{"key":"99_CR4","unstructured":"Manifest.permission. (s. f.). Android Developers. https:\/\/developer.android.com\/reference\/android\/Manifest.permission. Accessed 3 Oct 2021"},{"key":"99_CR5","unstructured":"Manifest.protectionLevel. (s. f.). Android Developers. https:\/\/developer.android.com\/guide\/topics\/manifest\/permission-element. Accessed 3 Oct 2021"},{"key":"99_CR6","unstructured":"M4: Insecure Authentication | OWASP. (2016). OWASP Mobile Top 10. https:\/\/owasp.org\/www-project-mobile-top-10\/2016-risks\/m4-insecure-authentication. Accessed 21 Dec 2021"},{"key":"99_CR7","doi-asserted-by":"publisher","unstructured":"Li, Z., Feng, G.: Inter-language static analysis for android application security. In: 2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE), pp. 647\u2013650 (2020). https:\/\/doi.org\/10.1109\/ICISCAE51034.2020.9236807","DOI":"10.1109\/ICISCAE51034.2020.9236807"},{"key":"99_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3448609","volume":"24","author":"R Mayrhofer","year":"2021","unstructured":"Mayrhofer, R., Stoep, J.V., Brubaker, C., Kralevich, N.: The android platform security model. ACM Trans. Priv. Secur. (TOPS) 24, 1\u201335 (2021)","journal-title":"ACM Trans. Priv. Secur. (TOPS)"},{"key":"99_CR9","unstructured":"One-tap SMS verification with the SMS User Consent API | SMS Verification APIs |. (s. f.). Google Developers. https:\/\/developers.google.com\/identity\/sms-retriever\/user-consent\/overview. Accessed 17 Jan 2022"},{"key":"99_CR10","unstructured":"GitHub - skylot\/jadx: Dex to Java decompiler. (s. f.). GitHub. https:\/\/github.com\/skylot\/jadx. Accessed 24 Jan 2022"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the International Conference on Ubiquitous Computing &amp; Ambient Intelligence (UCAmI 2022)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21333-5_99","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,20]],"date-time":"2022-11-20T19:11:39Z","timestamp":1668971499000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21333-5_99"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,21]]},"ISBN":["9783031213328","9783031213335"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21333-5_99","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022,11,21]]},"assertion":[{"value":"21 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"UCAmI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Ubiquitous Computing and Ambient Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"C\u00f3rdoba","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ucami2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mamilab.eu\/ucami2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}