{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:55:28Z","timestamp":1742399728348},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642142147"},{"type":"electronic","value":"9783642142154"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14215-4_4","type":"book-chapter","created":{"date-parts":[[2010,7,2]],"date-time":"2010-07-02T01:18:35Z","timestamp":1278033515000},"page":"61-80","source":"Crossref","is-referenced-by-count":40,"title":["Evaluating Bluetooth as a Medium for Botnet Command and Control"],"prefix":"10.1007","author":[{"given":"Kapil","family":"Singh","sequence":"first","affiliation":[]},{"given":"Samrit","family":"Sangal","sequence":"additional","affiliation":[]},{"given":"Nehil","family":"Jain","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Traynor","sequence":"additional","affiliation":[]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Grand Central Terminal, http:\/\/en.wikipedia.org\/wiki\/Grand_Central_Terminal (last accessed Feburary 2, 2010)","key":"4_CR1"},{"unstructured":"MTA NYC Transit: 2007 Ridership by Subway Station (2007), http:\/\/www.mta.info\/nyct\/facts\/ridership\/ridership_sub.htm (last accessed Feburary 2, 2010)","key":"4_CR2"},{"unstructured":"New York City Subway Rolling Stock, http:\/\/www.nycsubway.org\/cars\/index.html (last accessed Feburary 2, 2010)","key":"4_CR3"},{"unstructured":"Rail commuters still bothered by cell phone abuse, http:\/\/www.trainweb.org\/ct\/cellsurvey.htm (last accessed Feburary 2, 2010)","key":"4_CR4"},{"unstructured":"Sinit P2P Trojan Analysis, http:\/\/www.lurhq.com\/sinit.html (last accessed Feburary 2, 2010)","key":"4_CR5"},{"unstructured":"Barford, P., Yegneswaran, V.: An Inside Look at Botnets. Advances in Information Security (2006)","key":"4_CR6"},{"unstructured":"Cooke, E., Jahanian, F., Mcpherson, D.: The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. In: Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), Cambridge, MA (June 2005)","key":"4_CR7"},{"unstructured":"F.-S. Corporation: F-Secure Computer Virus Descriptions: Cabir (December 2004), http:\/\/www.f-secure.com\/v-descs\/cabir.shtml (last accessed Feburary 2, 2010)","key":"4_CR8"},{"unstructured":"F.-S. Corporation: F-Secure Computer Virus Descriptions: Mabir.A (April 2005), http:\/\/www.f-secure.com\/v-descs\/mabir.shtml (last accessed Feburary 2, 2010)","key":"4_CR9"},{"doi-asserted-by":"crossref","unstructured":"Dagon, D., Gu, G., Lee, C., Lee, W.: A Taxonomy of Botnet Structures. In: Proceedings of the 23 rd Annual Computer Security Applications Conference (ACSAC), Miami, FL (December 2007)","key":"4_CR10","DOI":"10.1109\/ACSAC.2007.44"},{"doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13 th USENIX Security Symposium (SECURITY), San Diego, CA (August 2004)","key":"4_CR11","DOI":"10.21236\/ADA465464"},{"doi-asserted-by":"crossref","unstructured":"Eagle, N., Pentland, A.: Reality Mining: Sensing Complex Social Systems. Journal of Personal and Ubiquitous Computing (2005)","key":"4_CR12","DOI":"10.1007\/s00779-005-0046-3"},{"unstructured":"Eckman, B.: http:\/\/lists.sans.org\/pipermail\/unisog\/2006-April\/026261.html (last accessed Feburary 2, 2010)","key":"4_CR13"},{"unstructured":"Ferrie, P., Szor, P., Stanev, R., Mouritzen, R.: Security Response: SymbOS.Cabir. Symantec Corporation (2007)","key":"4_CR14"},{"doi-asserted-by":"crossref","unstructured":"Fleizach, C., Liljenstam, M., Johansson, P., Voelker, G.M., Mehes, A.: Can You Infect Me Now?: Malware Propagation in Mobile Phone Networks. In: ACM Workshop on Recurring Malcode (WORM), Alexandria, Virginia, USA (November 2007)","key":"4_CR15","DOI":"10.1145\/1314389.1314402"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/11555827_19","volume-title":"Computer Security \u2013 ESORICS 2005","author":"F.C. Freiling","year":"2005","unstructured":"Freiling, F.C., Holz, T., Wicherski, G.: Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 319\u2013335. Springer, Heidelberg (2005)"},{"unstructured":"Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In: Proceedings of the 17 th USENIX Security Symposium (SECURITY), San Jose, CA (July 2008)","key":"4_CR17"},{"unstructured":"Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. In: Proceedings of the 16 th USENIX Security Symposium (SECURITY), Boston, MA (August 2007)","key":"4_CR18"},{"unstructured":"John, J.P., Moshchuk, A., Gribble, S.D., Krishnamurthy, A.: Studying Spamming Botnets Using Botlab. In: Proceedings of the 6 th Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA (April 2009)","key":"4_CR19"},{"doi-asserted-by":"crossref","unstructured":"Jung, S., Lee, U., Chang, A., Cho, D.-K., Gerla, M.: BlueTorrent: Cooperative Content Sharing for Bluetooth Users. In: Proceedings of the 5 th IEEE International Conference on Pervasive Computing and Communications (PerCom), White Plains, NY (March 2007)","key":"4_CR20","DOI":"10.1109\/PERCOM.2007.11"},{"unstructured":"Lactaotao, M.: Security Information: Virus Encyclopedia: Symbos_comwar.a: Technical Details. Trend Micro Incorporated (2005)","key":"4_CR21"},{"doi-asserted-by":"crossref","unstructured":"Mulliner, C., Vigna, G.: Vulnerability Analysis of MMS User Agents. In: Proceedings of the 22 rd Annual Computer Security Applications Conference (ACSAC), Miami Beach, FL (December 2006)","key":"4_CR22","DOI":"10.1109\/ACSAC.2006.55"},{"key":"4_CR23","first-page":"189","volume":"9","author":"M. Nekovee","year":"2007","unstructured":"Nekovee, M.: Worm Epidemics in Wireless Adhoc Networks. Journal of Physics\u00a09, 189 (2007)","journal-title":"Journal of Physics"},{"unstructured":"Pettey, C.: Gartner Says Worldwide Mobile Gaming Revenue to Grow 50 Percent in 2007 (June 2007), http:\/\/www.gartner.com\/it\/page.jsp?id=507467 (last accessed Feburary 2, 2010)","key":"4_CR24"},{"unstructured":"Provos, N., Mavrommatis, P., Rajab, M.A., Monrose, F.: All Your iFRAMEs Point to Us. In: Proceedings of the 17 th USENIX Security Symposium (SECURITY), San Jose, CA (July 2008)","key":"4_CR25"},{"unstructured":"Rajab, M., Zarfoss, J., Monrose, F., Terzis, A.: My Botnet is Bigger than Yours (Maybe, Better than Yours): Why Size Estimates Remain Challenging. In: Proceedings of the 1 st Workshop on Hot Topics in Understanding Botnets (HotBots), Cambridge, MA (April 2007)","key":"4_CR26"},{"doi-asserted-by":"crossref","unstructured":"Ramachandran, A., Feamster, N.: Understanding the Network-Level Behavior of Spammers. In: Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), Pisa, Italy (September 2006)","key":"4_CR27","DOI":"10.1145\/1159913.1159947"},{"unstructured":"Rhodes, C.J., Nekovee, M.: The Opportunistic Transmission of Wireless Worms between Mobile Devices (2008), http:\/\/arxiv.org\/abs\/0802.2685 (last accessed Feburary 2, 2010)","key":"4_CR28"},{"unstructured":"Science Daily. Medical Records on Your Cell Phone: Computer Scientists Turn Cell Phones into Health Care Resource (2006), http:\/\/www.sciencedaily.com\/videos\/2006\/0306-medical_records_on_your_cell_phone.htm (last accessed Feburary 2, 2010)","key":"4_CR29"},{"unstructured":"Srinivasan, V., Natarajan, A., Motani, M.: CRAWDAD data set nus\/bluetooth (v. 2007-09-03) (September 2007), http:\/\/crawdad.cs.dartmouth.edu\/nus\/bluetooth (last accessed Feburary 2, 2010)","key":"4_CR30"},{"doi-asserted-by":"crossref","unstructured":"Su, J., Chan, K., Miklas, A., Po, K., Akhavan, A., Saroiu, S., Lara, E., Goel, A.: A Preliminary Investigation of Worm Infections in a Bluetooth Environment. In: ACM Workshop on Recurring Malcode (WORM), Alexandria, VA (November 2006)","key":"4_CR31","DOI":"10.1145\/1179542.1179545"},{"unstructured":"Traynor, P.: Characterizing the Limitations of Third-Party EAS Over Cellular Text Messaging Services. 3G Americas Whitepaper (2008)","key":"4_CR32"},{"doi-asserted-by":"crossref","unstructured":"Traynor, P., Enck, W., McDaniel, P., Porta, T.L.: Exploiting Open Functionality in SMS-Capable Cellular Networks. Journal of Computer Security (JCS) (2008)","key":"4_CR33","DOI":"10.3233\/JCS-2007-0308"},{"doi-asserted-by":"crossref","unstructured":"Traynor, P., Lin, M., Ongtang, M., Rao, V., Jaeger, T., La Porta, T., McDaniel, P.: On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), Chicago, IL (November 2009)","key":"4_CR34","DOI":"10.1145\/1653662.1653690"},{"unstructured":"Vamosi, R.: Mobile phone malware in our future (2008), http:\/\/news.cnet.com\/8301-10789_3-10071982-57.html (Last accessed February 2, 2010)","key":"4_CR35"},{"unstructured":"Waldman, M., Rubin, A.D., Cranor, L.F.: Publius: A Robust, Tamper-Evident, Censorship-Resistant Web Publishing System. In: Proceedings of the 9 th USENIX Security Symposium (SECURITY), Denver, CO (August 2000)","key":"4_CR36"},{"doi-asserted-by":"crossref","unstructured":"Yan, G., Eidenbenz, S.: Bluetooth Worms: Models, Dynamics, and Defense Implications. In: Proceedings of the 22 rd Annual Computer Security Applications Conference (ACSAC), Miami Beach, FL (December 2006)","key":"4_CR37","DOI":"10.1109\/ACSAC.2006.18"},{"doi-asserted-by":"crossref","unstructured":"Yan, G., Eidenbenz, S.: Modeling Propagation Dynamics of Bluetooth Worms. In: Proceedings of the 27 th International Conference on Distributed Computing Systems (ICDCS), Toronto, Canada (June 2007)","key":"4_CR38","DOI":"10.1109\/ICDCS.2007.121"},{"doi-asserted-by":"crossref","unstructured":"Yan, G., Flores, H.D., Cuellar, L., Hengartner, N., Eidenbenz, S., Vu, V.: Bluetooth Worm Propagation: Mobility Pattern Matters! In: Proceedings of the 2 nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), Singapore (March 2007)","key":"4_CR39","DOI":"10.1145\/1229285.1229294"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14215-4_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:49:18Z","timestamp":1606168158000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14215-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642142147","9783642142154"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14215-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}