{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:30:30Z","timestamp":1725676230159},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/percomw.2012.6197513","type":"proceedings-article","created":{"date-parts":[[2012,5,24]],"date-time":"2012-05-24T18:30:23Z","timestamp":1337884223000},"page":"374-380","source":"Crossref","is-referenced-by-count":4,"title":["A leaky bucket called smartphone"],"prefix":"10.1109","author":[{"given":"Osman","family":"Ugus","sequence":"first","affiliation":[]},{"given":"Dirk","family":"Westhoff","sequence":"additional","affiliation":[]},{"given":"Hariharan","family":"Rajasekaran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866318"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CANET.2007.4401672"},{"journal-title":"How To Building a BlueSniper Rifle - Part 1","year":"2005","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.178"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-121","author":"scarfone","year":"2008","journal-title":"Guide to Bluetooth Security"},{"journal-title":"Coming Soon A New Way to Hack into Smartphones","year":"2011","author":"weinmann","key":"13"},{"journal-title":"All Your Baseband Are Belong to Us (Presentation)","year":"2011","author":"weinmann","key":"14"},{"journal-title":"\"SMS of Death\" Could Crash Many Mobile Phones","year":"2011","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359550"},{"journal-title":"Android Rootkit Demonstrated","year":"2010","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734596"},{"key":"22","article-title":"The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)","author":"hovav","year":"0","journal-title":"14th ACM CCS '07 Alexandria Virginia USA Oct 2007"},{"journal-title":"Return Oriented Programming for the ARM Architecture","year":"2009","author":"kornau","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"journal-title":"Ubuntu Lucid Lynx 10 04 Can Read Your IPhone's Secrets","year":"2010","key":"25"},{"key":"26","article-title":"An MTM based Watchdog for Malware Famishment in Smartphones","author":"ugus","year":"0","journal-title":"11th I2CS Berlin Germany June 2011"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1002\/sec.360"},{"journal-title":"ROPdefender A Detection Tool to Defend Against Return-Oriented Programming Attacks","year":"2010","author":"davi","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920269"},{"journal-title":"Android Wallpaper App Beams Users Data to Chinese Servers","year":"2010","key":"3"},{"journal-title":"Carrier IQ Faces Federal Probe into Allegations Software Tracks Cellphone Data","year":"2011","key":"2"},{"key":"10","article-title":"Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices","author":"becher","year":"0","journal-title":"IEEE SP'11 Oakland California USA May 2011"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1839676.1839688"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920313"},{"journal-title":"iPhone Jailbroken by Safari Vulnerability Again - Update","year":"2010","key":"7"},{"journal-title":"Backdoor Exploit for Android Phones","year":"2010","key":"6"},{"journal-title":"Stolen Apps That Root Android Steal Data and Open Backdoors Available for Download from Google Market","year":"2011","key":"5"},{"key":"31","article-title":"MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones","author":"davi","year":"0","journal-title":"19th ANDSS'12 Feb 2012"},{"journal-title":"Researchers Show Infecting Smartphones with Malware Is Relatively Easy","year":"2010","key":"4"},{"key":"9","article-title":"Soundminer: A Stealthy and Context-Aware Sound Trojan for Smartphones","author":"schlegel","year":"0","journal-title":"18th NDSS'11 San Diego California USA Feb 2011"},{"journal-title":"Denial of Service in Internet Explorer for MS Windows Mobile 5 0","year":"2007","key":"8"}],"event":{"name":"2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","start":{"date-parts":[[2012,3,19]]},"location":"Lugano, Switzerland","end":{"date-parts":[[2012,3,23]]}},"container-title":["2012 IEEE International Conference on Pervasive Computing and Communications Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6192378\/6197445\/06197513.pdf?arnumber=6197513","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T15:14:37Z","timestamp":1497971677000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6197513\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/percomw.2012.6197513","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}