{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:22:56Z","timestamp":1726042976687},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662583869"},{"type":"electronic","value":"9783662583876"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-662-58387-6_13","type":"book-chapter","created":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T11:03:39Z","timestamp":1567076619000},"page":"243-252","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Attacks Against GSMA\u2019s M2M Remote Provisioning (Short Paper)"],"prefix":"10.1007","author":[{"given":"Maxime","family":"Meyer","sequence":"first","affiliation":[]},{"given":"Elizabeth A.","family":"Quaglia","sequence":"additional","affiliation":[]},{"given":"Ben","family":"Smyth","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Security Protocols","author":"R Anderson","year":"1998","unstructured":"Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125\u2013136. Springer, Heidelberg (1998). \n                      https:\/\/doi.org\/10.1007\/BFb0028165"},{"key":"13_CR2","unstructured":"Berard, X., Gachon, D.: Method for remotely delivering a full subscription profile to a UICC over IP, November 2013. US Patent App. 13\/991,846"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-540-73408-6_18","volume-title":"Public Key Infrastructure","author":"D Berbecaru","year":"2007","unstructured":"Berbecaru, D., Lioy, A.: On the robustness of applications based on the SSL and TLS security protocols. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 248\u2013264. Springer, Heidelberg (2007). \n                      https:\/\/doi.org\/10.1007\/978-3-540-73408-6_18"},{"key":"13_CR4","unstructured":"Blom, R., Norrman, K., Naslund, M., Rommer, S., Sahlin, B.: Security in the evolved packet system. Technical report, February 2010"},{"key":"13_CR5","unstructured":"ETSI: Smart Cards; Embedded UICC; Requirements Specification (V. 12.0.0). Technical Specification 103 383, September 2013"},{"key":"13_CR6","unstructured":"Girard, P., Proust, P.: Method for managing content on a secure element connected to an equipment, November 2013. US Patent App. 13\/991,823"},{"key":"13_CR7","unstructured":"GlobalPlatform: Card Specification (V. 2.3). Technical Specification GPC\n                      \n                        \n                      \n                      $$\\_$$\n                    SPE\n                      \n                        \n                      \n                      $$\\_$$\n                    034, October 2015"},{"key":"13_CR8","unstructured":"Gow, D.: Telef\u00f3nica hit by record \u20ac152m anti-trust fine, July 2007. \n                      goo.gl\/Dvx6kk\n                      \n                    . Accessed 6 Dec 2016"},{"key":"13_CR9","unstructured":"GSMA: GSMA announces mobile industry initiative to create a global remote provisioning specification for consumer devices, March 2015"},{"key":"13_CR10","unstructured":"GSMA: Business Process for Remote SIM Provisioning in M2M (V.1.0). Technical Specification CLP.05, February 2015"},{"key":"13_CR11","unstructured":"GSMA: Remote Provisioning Architecture for Embedded UICC (V. 3.1). Technical Specification SGP.02, May 2016"},{"key":"13_CR12","unstructured":"GSMA: M2M IoT Trust Model (V. 1.0). Technical Specification SGP.15, November 2017"},{"key":"13_CR13","unstructured":"GSMA: Remote Provisioning Architecture for Embedded UICC (V. 3.2). Technical Specification SGP.02, June 2017"},{"key":"13_CR14","unstructured":"Jiang, S., Smith, S., Minami, K.: Securing web servers against insider attack. In: Annual Computer Security Applications Conference, pp. 265\u2013276. IEEE (2001)"},{"key":"13_CR15","unstructured":"Langley, A.: Further improving digital certificate security, December 2013. \n                      goo.gl\/kRHHD6\n                      \n                    . Accessed 16 Jan 2017"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Merrien, L., Berard, X., Gachon, D.: Method for transmitting a SIM application of a first terminal to a second terminal, May 2014. US Patent App. 13\/991,542","DOI":"10.1016\/S1350-4789(14)70416-7"},{"key":"13_CR17","unstructured":"Meyer, M., Quaglia, E.A., Smyth, B.: Overview of GSMA remote provisioning specification (2017). \n                      https:\/\/bensmyth.com\/publications\/2017-eUICC-overview\/"},{"key":"13_CR18","unstructured":"Microsoft: Fraudulent Digital Certificates Could Allow Spoofing, August 2011. \n                      goo.gl\/bLbSQM\n                      \n                    . Accessed 16 Jan 2017"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Park, J., Baek, K., Kang, C.: Secure profile provisioning architecture for embedded UICC. In: International Conference on Availability, Reliability and Security, pp. 297\u2013303. IEEE (2013)","DOI":"10.1109\/ARES.2013.40"},{"key":"13_CR20","unstructured":"Schneier, B.: Cyberwar, June 2007. \n                      goo.gl\/SJW3oU\n                      \n                    . Accessed 12 Oct 2016"},{"issue":"6","key":"13_CR21","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1016\/S0167-4048(02)01009-X","volume":"21","author":"EE Schultz","year":"2002","unstructured":"Schultz, E.E.: A framework for understanding and predicting insider attacks. Comput. Secur. 21(6), 526\u2013531 (2002)","journal-title":"Comput. Secur."},{"key":"13_CR22","unstructured":"Sierra Wireless: The eUICC opportunity: harness the power of IoT eSIMS. White paper (2017)"},{"key":"13_CR23","unstructured":"Smyth, B., Pironti, A.: Truncating TLS connections to violate beliefs in web applications. In: USENIX Workshop on Offensive Technologies. USENIX Association (2013). see also INRIA tech. rep. hal-01102013 (2015)"},{"key":"13_CR24","unstructured":"Thomas, D.: France hits orange with & \u20ac350m antitrust fine, December 2015. \n                      goo.gl\/B8z1Xf\n                      \n                    . Accessed 6 Dec 2016"},{"key":"13_CR25","unstructured":"Vermeulen, J.: Why it is legal for FNB to SIM-lock its smartphones, September 2016. \n                      https:\/\/goo.gl\/xbX5zn\n                      \n                    . Accessed 16 Jan 2017"},{"issue":"10","key":"13_CR26","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"AD Wood","year":"2002","unstructured":"Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35(10), 54\u201362 (2002)","journal-title":"Computer"},{"issue":"3","key":"13_CR27","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1341731.1341736","volume":"11","author":"L Xie","year":"2008","unstructured":"Xie, L., Zhu, S.: Message dropping attacks in overlay networks: attack detection and attacker identification. ACM Trans. Inf. Syst. Secur. 11(3), 15 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-58387-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T11:05:34Z","timestamp":1567076734000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-58387-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783662583869","9783662583876"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-58387-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"7 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nieuwpoort","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cura\u00e7ao","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 February 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 March 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc18.ifca.ai\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"110","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,27","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,27","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}