{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:29:41Z","timestamp":1755998981902},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/tifs.2013.2259818","type":"journal-article","created":{"date-parts":[[2013,4,24]],"date-time":"2013-04-24T18:03:52Z","timestamp":1366826632000},"page":"1027-1037","source":"Crossref","is-referenced-by-count":27,"title":["FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment"],"prefix":"10.1109","volume":"8","author":[{"given":"E.","family":"Fernandes","sequence":"first","affiliation":[]},{"given":"B.","family":"Crispo","sequence":"additional","affiliation":[]},{"given":"M.","family":"Conti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.151"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2006.32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.85"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378627"},{"key":"ref30","author":"jiang","year":"0","journal-title":"DroidKungFu3 Malware"},{"key":"ref37","first-page":"331","article-title":"Implications of radio fingerprinting on the security of sensor networks","author":"rasmussen","year":"0","journal-title":"Proc 3rd Int Conf Security and Privacy in Communication Networks (SecureComm'07)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734603"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920313"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/sec.360"},{"key":"ref10","year":"0","journal-title":"KillingInTheNameOf"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.2"},{"key":"ref11","year":"0","journal-title":"NotCompatible Drive-By Download Attack on Android devices"},{"key":"ref12","year":"0","journal-title":"PIRA32 RDS Encoder module"},{"key":"ref13","article-title":"Samsung Galaxy S, the most popular Samsung Phone","year":"0","journal-title":"PCMAG"},{"key":"ref14","author":"garcia-morchon","year":"0","journal-title":"Security Considerations in the IP-based Internet of Things"},{"key":"ref15","author":"smalley","year":"0","journal-title":"The Case for SE Android"},{"key":"ref16","year":"0","journal-title":"The Max Headroom Incident"},{"key":"ref17","year":"2011","journal-title":"Android on the Boeing 787"},{"key":"ref18","year":"0","journal-title":"Congressional Mandate for FM Receivers in portable electronics"},{"key":"ref19","article-title":"Hijacking RDS TMC traffic information signal","author":"barisani","year":"2011","journal-title":"Phrack Mag"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"ref4","year":"0","journal-title":"Developing Secure Mobile Applications for Android"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2009.26","article-title":"Understanding android security","volume":"7","author":"enck","year":"2009","journal-title":"IEEE Security and Privacy"},{"key":"ref3","year":"0","journal-title":"Android Distribution"},{"key":"ref6","year":"0","journal-title":"eXtended RDS protocol xRDS"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"ref5","year":"0","journal-title":"DexClassLoader Android API"},{"key":"ref8","author":"jiang","year":"0","journal-title":"GingerMaster Malware"},{"key":"ref7","year":"0","journal-title":"Ginger"},{"key":"ref2","year":"0","journal-title":"Android Class Loading Hijacking Symantec Security Report"},{"key":"ref9","author":"lockheimer","year":"0","journal-title":"Google reveals the Bouncer service for the Android Market"},{"key":"ref1","year":"0","journal-title":"AlertFM"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046624"},{"key":"ref22","first-page":"6","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proc 20th USENIX Conf Security (SEC'11)"},{"key":"ref21","author":"burns","year":"0","journal-title":"Developing Secure Mobile Applications for Android"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"ref24","article-title":"Quire: Lightweight provenance for smart phone operating systems","author":"dietz","year":"0","journal-title":"Proc 20th USENIX Security Symp (SEC'11)"},{"key":"ref41","first-page":"87","article-title":"Rds-tmc spoofing using gnu radio","author":"symeonidis","year":"2010","journal-title":"Proc 6th Karlsruhe Workshop on Software Radios"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2204249"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"ref25","article-title":"A study of android application security","author":"enck","year":"0","journal-title":"Proc 20th USENIX Security Symp (SEC'11)"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6516989\/06507551.pdf?arnumber=6507551","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:45:10Z","timestamp":1638218710000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6507551\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":42,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2013.2259818","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6]]}}}