{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:06:24Z","timestamp":1725771984915},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319048963"},{"type":"electronic","value":"9783319048970"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-04897-0_12","type":"book-chapter","created":{"date-parts":[[2014,2,18]],"date-time":"2014-02-18T03:34:38Z","timestamp":1392694478000},"page":"179-195","source":"Crossref","is-referenced-by-count":10,"title":["Security Testing of GSM Implementations"],"prefix":"10.1007","author":[{"given":"Fabian","family":"van den Broek","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Brinio","family":"Hond","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arturo","family":"Cedillo Torres","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"GSM-Association: data and analysis for the mobile industry, \n                    \n                      https:\/\/gsmaintelligence.com\/"},{"key":"12_CR2","unstructured":"UK smartmeter company using GSM\/GPRS, \n                    \n                      http:\/\/www.smsmetering.co.uk\/products\/smart-meters\/gsm-gprs-meters.aspx"},{"key":"12_CR3","unstructured":"Hack a day website on sim card carrying traffic lights, \n                    \n                      http:\/\/hackaday.com\/2011\/01\/28\/sim-card-carrying-traffic-lights\/"},{"key":"12_CR4","unstructured":"GSM-R Industry Group, \n                    \n                      http:\/\/www.gsm-rail.com\/"},{"key":"12_CR5","unstructured":"News story on the absence of plans to stop 2g services, \n                    \n                      http:\/\/www.computerweekly.com\/news\/2240160984\/Will-the-UK-turn-off-its-2G-networks-in-2017"},{"key":"12_CR6","unstructured":"Briceno, M., Goldberg, I., Wagner, D.: A pedagogical implementation of the GSM A5\/1 and A5\/2 \u201cvoice privacy\u201d encryption algorithms (1999), \n                    \n                      http:\/\/cryptome.org\/gsm-a512.htm\n                    \n                    \n                   (originally on \n                    \n                      www.scard.org\n                    \n                    \n                  )"},{"key":"12_CR7","unstructured":"Website of the Ettus company, selling USRPs, \n                    \n                      http:\/\/www.ettus.com\/"},{"key":"12_CR8","unstructured":"Burgess, D.: Homepage of the OpenBTS project, \n                    \n                      http:\/\/openbts.sourceforge.net\/"},{"key":"12_CR9","unstructured":"Nohl, K.: Attacking phone privacy. Blackhat 2010 (2010), \n                    \n                      https:\/\/srlabs.de\/blog\/wp-content\/uploads\/2010\/07\/Attacking.Phone_.Privacy_Karsten.Nohl_1.pdf"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1007\/978-3-642-38553-7_24","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2013","author":"F. Broek van den","year":"2013","unstructured":"van den Broek, F., Poll, E.: A comparison of time-memory trade-off attacks on stream ciphers. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol.\u00a07918, pp. 406\u2013423. Springer, Heidelberg (2013)"},{"key":"12_CR11","unstructured":"ETSI. Digital cellular telecommunications system (Phase 2+); UMTS; LTE; Point-to-Point (PP) Short Message Service (SMS) support on mobile radio interface (3GPP TS 24.011 version 11.1.0 Release 11) (2012)"},{"key":"12_CR12","unstructured":"ETSI. Digital cellular telecommunications system (Phase 2+); UMTS;Technical realization of the Short Message Service (SMS), (3GPP TS 23.040 version 11.5.0 Release 11) (2013)"},{"key":"12_CR13","unstructured":"Myers, G.J.: The Art of Software Testing. John Wiley & Sons (1979)"},{"key":"12_CR14","unstructured":"Kuipers, R., Takanen, A.: Fuzzing embedded devices. GreHack 2012, 38 (2012)"},{"key":"12_CR15","unstructured":"Welte, H.: Anatomy of contemporary GSM cellphone hardware (2010), \n                    \n                      http:\/\/laforge.gnumonks.org\/papers\/gsm_phone-anatomy-latest.pdf"},{"key":"12_CR16","unstructured":"Mulliner, C., Miller, C.: Injecting SMS Messages into Smart Phones for Security Analysis. In: Proceedings of the 3rd USENIX Workshop on Offensive Technologies (WOOT). Montreal, Canada (August 2009)"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-41488-6_13","volume-title":"Secure IT Systems","author":"F. Broek van den","year":"2013","unstructured":"van den Broek, F., Wichers Schreur, R.: Femtocell Security in Theory and Practice. In: Riis Nielson, H., Gollmann, D. (eds.) NordSec 2013. LNCS, vol.\u00a08208, pp. 183\u2013198. Springer, Heidelberg (2013)"},{"key":"12_CR18","unstructured":"Welte, H.: Homepage of the OpenBSC project, \n                    \n                      http:\/\/openbsc.osmocom.org\/"},{"key":"12_CR19","unstructured":"Homepage of the GNU Radio project, \n                    \n                      http:\/\/gnuradio.org\/"},{"key":"12_CR20","unstructured":"Welte, H.: Homepage of the OsmoBTS project, \n                    \n                      http:\/\/openbsc.osmocom.org\/trac\/wiki\/OsmoBTS"},{"key":"12_CR21","unstructured":"Collection of fuzzing software, \n                    \n                      http:\/\/fuzzing.org\/"},{"key":"12_CR22","unstructured":"Code archive of the sulley fuzzing framework, \n                    \n                      https:\/\/github.com\/OpenRCE\/sulley"},{"key":"12_CR23","unstructured":"Engel, T.: S60 Curse of Silence. CCC Berlin (2008) \n                    \n                      http:\/\/berlin.ccc.de\/~tobias\/cos\/"},{"key":"12_CR24","unstructured":"Vuontisj\u00e4rvi, M., Rontti, T.: SMS Fuzzing. Codenomicon whitepaper (2011), \n                    \n                      http:\/\/www.codenomicon.com\/resources\/whitepapers\/codenomicon_wp_SMS_fuzzing_02_08_2011.pdf"},{"key":"12_CR25","unstructured":"Mulliner, C., Golde, N., Seifert, J.-P.: SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale. In: USENIX (2011)"},{"key":"12_CR26","unstructured":"Mulliner, C., Miller, C.: Fuzzing the Phone in your Phone. Black Hat USA (June 2009)"},{"key":"12_CR27","unstructured":"Hond, B.: Fuzzing the GSM protocol. Master\u2019s thesis, Radboud University Nijmegen, Kerckhoff\u2019s Master, The Netherlands (2011)"},{"key":"12_CR28","unstructured":"Torres, A.C.: GSM cell broadcast service security analysis. Master\u2019s thesis, Technical University Eindhoven, Kerckhoff\u2019s Master, The Netherlands (2013)"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Mulliner, C., Vigna, G.: Vulnerability Analysis of MMS User Agents. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), Miami, FL (December 2006)","DOI":"10.1109\/ACSAC.2006.55"},{"key":"12_CR30","unstructured":"Weinmann, R.-P.: Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks. In: WOOT, pp. 12\u201321 (2012)"},{"key":"12_CR31","unstructured":"Weinmann, R.-P.: The baseband apocalypse. In: 27th Chaos Communication Congress Berlin (2010)"},{"key":"12_CR32","unstructured":"P1Security. website detailing a fuzzing product for telco core-networks, \n                    \n                      http:\/\/www.p1sec.com\/corp\/products\/p1-telecom-fuzzer-ptf\/"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-04897-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T03:42:06Z","timestamp":1558842126000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-04897-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319048963","9783319048970"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-04897-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}