{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:02Z","timestamp":1763468222076},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642387081"},{"type":"electronic","value":"9783642387098"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44885-4_2","type":"book-chapter","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T05:10:25Z","timestamp":1409116225000},"page":"19-32","source":"Crossref","is-referenced-by-count":7,"title":["USB Connection Vulnerabilities on Android Smartphones: Default and Vendors\u2019 Customizations"],"prefix":"10.1007","author":[{"given":"Andr\u00e9","family":"Pereira","sequence":"first","affiliation":[]},{"given":"Manuel","family":"Correia","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Brand\u00e3o","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Android Pushes Past 80% Market Share While Windows Phone Shipments Leap 156.0% Year Over Year in the Third Quarter, According to IDC - prUS24442013, http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS24442013"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Wu, L., Grace, M., Zhou, Y., Wu, C., Jiang, X.: The impact of vendor customizations on android security. In: Proc. 2013 ACM SIGSAC Conf. Comput. Commun. Secur., CCS 2013, pp. 623\u2013634 (2013)","DOI":"10.1145\/2508859.2516728"},{"key":"2_CR3","unstructured":"Technical Specification Group Terminals: AT command set for 3GPP User Equipment (UE) (3G TS 27.007 version 2.0.0) 4, 17\u201318 (1999)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Mulliner, C., Liebergeld, S., Lange, M., Seifert, J.-P.: Taming Mr Hayes: Mitigating signaling based attacks on smartphones. In: IEEE\/IFIP Int. Conf. Dependable Syst. Networks (DSN 2012), pp. 1\u201312 (2012)","DOI":"10.1109\/DSN.2012.6263943"},{"key":"2_CR5","first-page":"51","volume":"4","author":"A.J. Singh","year":"2014","unstructured":"Singh, A.J., Bhardwaj, A.: Android Internals and Telephony. Int. J. Emerg. Technol. Adv. Eng.\u00a04, 51\u201359 (2014)","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"2_CR6","unstructured":"Module, H.: Android RIL Integration Guide- Huawei (2014)"},{"key":"2_CR7","unstructured":"Odin 3.09 - Odin download with Samsung ROM Flashing Tool, http:\/\/odindownload.com\/"},{"key":"2_CR8","unstructured":"Heimdall | Glass Echidna, http:\/\/glassechidna.com.au\/heimdall\/"},{"key":"2_CR9","unstructured":"Security\u00a0Enhancements\u00a0in\u00a0Android\u00a04.3\u00a0|\u00a0Android\u00a0Developers, http:\/\/source.android.com\/devices\/tech\/security\/enhancements43.html"},{"key":"2_CR10","unstructured":"Android\u00a0Debug\u00a0Bridge\u00a0|\u00a0Android\u00a0Developers, http:\/\/developer.android.com\/tools\/help\/adb.html"},{"key":"2_CR11","unstructured":"Vidas, T., Cylab, E.C.E., Votipka, D., Cylab, I.N.I., Christin, N.: All Your Droid Are Belong To Us: A Survey of Current Android Attacks. In: WOOT (2011)"},{"key":"2_CR12","unstructured":"SuperOneClick Root v2.3.3, http:\/\/www.superoneclickdownload.com\/"},{"key":"2_CR13","unstructured":"Cydia Impactor, http:\/\/www.cydiaimpactor.com\/"},{"key":"2_CR14","unstructured":"pywinauto - Windows GUI automation using Python - Google Project Hosting, https:\/\/code.google.com\/p\/pywinauto\/"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Hoog, A.: Android Forensics: Investigation, Analysis and Mobile Security for Google Android. Elsevier (2011)","DOI":"10.1016\/B978-1-59749-651-3.10001-9"},{"key":"2_CR16","unstructured":"Android\u00a0Init\u00a0Language\u00a0Google\u00a0Git, https:\/\/android.googlesource.com\/platform\/system\/core\/+\/master\/init\/readme.txt"},{"key":"2_CR17","unstructured":"VRT: Androrat - Android Remote Access Tool, http:\/\/vrt-blog.snort.org\/2013\/07\/androrat-android-remote-access-tool.html"},{"key":"2_CR18","unstructured":"Superuser, http:\/\/androidsu.com\/superuser\/"},{"key":"2_CR19","unstructured":"Gargenta, M.: Learning Android. O\u2019Reilly Media, Inc. (2011)"},{"key":"2_CR20","unstructured":"Terminal Software, http:\/\/realterm.sourceforge.net\/"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44885-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T06:18:24Z","timestamp":1565763504000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44885-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642387081","9783642387098"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44885-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}