{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:39:06Z","timestamp":1759091946646,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,11,3]],"date-time":"2006-11-03T00:00:00Z","timestamp":1162512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,11,3]]},"DOI":"10.1145\/1179542.1179545","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"9-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["A preliminary investigation of worm infections in a bluetooth environment"],"prefix":"10.1145","author":[{"given":"Jing","family":"Su","sequence":"first","affiliation":[{"name":"University of Toronto"}]},{"given":"Kelvin K. W.","family":"Chan","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"Andrew G.","family":"Miklas","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"Kenneth","family":"Po","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"Ali","family":"Akhavan","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"Stefan","family":"Saroiu","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"Eyal","family":"de Lara","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"Ashvin","family":"Goel","sequence":"additional","affiliation":[{"name":"University of Toronto"}]}],"member":"320","published-online":{"date-parts":[[2006,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A Linearization Attack on the Bluetooth Key Stream Generator","author":"Armknecht F.","year":"2002","unstructured":"F. Armknecht . A Linearization Attack on the Bluetooth Key Stream Generator , 2002 . Cryptology ePrint Archive, Report 2002\/191. F. Armknecht. A Linearization Attack on the Bluetooth Key Stream Generator, 2002. Cryptology ePrint Archive, Report 2002\/191."},{"volume-title":"Specification of the Bluetooth System","year":"2006","key":"e_1_3_2_1_2_1","unstructured":"Bluetooth. Specification of the Bluetooth System , 2006 . http:\/\/www.bluetooth.org\/foundry\/adopters\/document\/Core_v2.0_EDR\/en\/1\/Core_v2.0_EDR.zip. Bluetooth. Specification of the Bluetooth System, 2006. http:\/\/www.bluetooth.org\/foundry\/adopters\/document\/Core_v2.0_EDR\/en\/1\/Core_v2.0_EDR.zip."},{"volume-title":"The Official Bluetooth Wireless Info Site","year":"2006","key":"e_1_3_2_1_3_1","unstructured":"Bluetooth.com. The Official Bluetooth Wireless Info Site , 2006 . http:\/\/www.bluetooth.com. Bluetooth.com. The Official Bluetooth Wireless Info Site, 2006. http:\/\/www.bluetooth.com."},{"key":"e_1_3_2_1_4_1","volume-title":"BlueZ -- Official Linux Bluetooth Protocol Stack","author":"Z.","year":"2006","unstructured":"Blue Z. BlueZ -- Official Linux Bluetooth Protocol Stack , 2006 . http:\/\/www.bluez.org. BlueZ. BlueZ -- Official Linux Bluetooth Protocol Stack, 2006. http:\/\/www.bluez.org."},{"key":"e_1_3_2_1_5_1","volume-title":"Serious Flaws in Bluetooth Security Lead to Disclosure of Personal Data","author":"Bunker T.","year":"2006","unstructured":"T. Bunker . Serious Flaws in Bluetooth Security Lead to Disclosure of Personal Data , 2006 . http:\/\/www.thebunker.net\/security\/bluetooth.htm. T. Bunker. Serious Flaws in Bluetooth Security Lead to Disclosure of Personal Data, 2006. http:\/\/www.thebunker.net\/security\/bluetooth.htm."},{"key":"e_1_3_2_1_6_1","volume-title":"Initial Studies on Worm Propagation in MANETS for Future Army Combat Systems","author":"Cole R. G.","year":"2004","unstructured":"R. G. Cole . Initial Studies on Worm Propagation in MANETS for Future Army Combat Systems , 2004 . http:\/\/stinet.dtic.mil\/oai\/oai&verb=getRecord&metadataPrefix=html&identifier=ADA431999. R. G. Cole. Initial Studies on Worm Propagation in MANETS for Future Army Combat Systems, 2004. http:\/\/stinet.dtic.mil\/oai\/oai&verb=getRecord&metadataPrefix=html&identifier=ADA431999."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/PADS.2005.21"},{"volume-title":"Mobile Phones","year":"2005","key":"e_1_3_2_1_8_1","unstructured":"ComputerWorld. Cabir Worm Wriggles into U.S . Mobile Phones , 2005 . http:\/\/www.computerworld.com\/securitytopics\/security\/virus\/story\/0,108 01,99935,00.html. ComputerWorld. Cabir Worm Wriggles into U.S. Mobile Phones, 2005. http:\/\/www.computerworld.com\/securitytopics\/security\/virus\/story\/0,108 01,99935,00.html."},{"key":"e_1_3_2_1_9_1","volume-title":"Crawdad: A Community Resource for Archiving Wireless Data at Dartmouth","author":"CRAWDAD.","year":"2006","unstructured":"CRAWDAD. Crawdad: A Community Resource for Archiving Wireless Data at Dartmouth , 2006 . http:\/\/crawdad.cs.dartmouth.edu\/l. CRAWDAD. Crawdad: A Community Resource for Archiving Wireless Data at Dartmouth, 2006. http:\/\/crawdad.cs.dartmouth.edu\/l."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.21"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0046-3"},{"key":"e_1_3_2_1_12_1","volume-title":"Improved Key Recovery of Level 1 of the Bluetooth Encryption System","author":"Fluhrer S. R.","year":"2002","unstructured":"S. R. Fluhrer . Improved Key Recovery of Level 1 of the Bluetooth Encryption System , 2002 . Cryptology ePrint Archive, Report 2002\/068. S. R. Fluhrer. Improved Key Recovery of Level 1 of the Bluetooth Encryption System, 2002. Cryptology ePrint Archive, Report 2002\/068."},{"key":"e_1_3_2_1_13_1","unstructured":"M. Herfurt. Bluetsnarfing @ CeBIT 2004 -- Detecting and Attacking Bluetooth-enabled Cellphones at the Hanover Fairground 2004. http:\/\/trifinite.org\/Downloads\/BlueSnarf_CeBIT2004.pdf.  M. Herfurt. Bluetsnarfing @ CeBIT 2004 -- Detecting and Attacking Bluetooth-enabled Cellphones at the Hanover Fairground 2004. http:\/\/trifinite.org\/Downloads\/BlueSnarf_CeBIT2004.pdf."},{"key":"e_1_3_2_1_14_1","first-page":"17","volume-title":"Information Security and Cryptology","author":"Hermelin M.","year":"1999","unstructured":"M. Hermelin and K. Nyberg . Correlation Properties of the Bluetooth Combiner Generator . In Information Security and Cryptology , pages 17 -- 29 , 1999 . M. Hermelin and K. Nyberg. Correlation Properties of the Bluetooth Combiner Generator. In Information Security and Cryptology, pages 17--29, 1999."},{"key":"e_1_3_2_1_15_1","volume-title":"International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks","author":"Hoh B.","year":"2006","unstructured":"B. Hoh and M. Gruteser . Computer Ecology: Responding to Mobile Worms with Location-Based Quarantine Boundaries . In International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks , 2006 . B. Hoh and M. Gruteser. Computer Ecology: Responding to Mobile Worms with Location-Based Quarantine Boundaries. In International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks, 2006."},{"volume-title":"First Symbian OS Virus to Replicate over MMS Appears","year":"2005","key":"e_1_3_2_1_16_1","unstructured":"InfoSyncWorld. First Symbian OS Virus to Replicate over MMS Appears , 2005 . http:\/\/www.infosyncworld.com\/news\/n\/5835.html. InfoSyncWorld. First Symbian OS Virus to Replicate over MMS Appears, 2005. http:\/\/www.infosyncworld.com\/news\/n\/5835.html."},{"key":"e_1_3_2_1_17_1","volume-title":"LNCS","author":"Jakobsson M.","year":"2020","unstructured":"M. Jakobsson and S. Wetzel . Security Weaknesses in Bluetooth. CT-RSA 2001: Proceedings of the 2001 Conference on Topics in Cryptology, pages 176--191, 2001 . LNCS 2020 . M. Jakobsson and S. Wetzel. Security Weaknesses in Bluetooth. CT-RSA 2001: Proceedings of the 2001 Conference on Topics in Cryptology, pages 176--191, 2001. LNCS 2020."},{"key":"e_1_3_2_1_18_1","volume-title":"Bluetooth Hacking","author":"Laurie A.","year":"2004","unstructured":"A. Laurie , M. Holtmann , and M. Herfurt . Bluetooth Hacking , 2004 . http:\/\/www.ccc.de\/congress\/2004\/fahrplan\/event\/66.en.html. A. Laurie, M. Holtmann, and M. Herfurt. Bluetooth Hacking, 2004. http:\/\/www.ccc.de\/congress\/2004\/fahrplan\/event\/66.en.html."},{"key":"e_1_3_2_1_19_1","volume-title":"A Uniform Framework for Cryptanalysis of the Bluetooth E0 cipher","author":"Levy O.","year":"2005","unstructured":"O. Levy and A. Wool . A Uniform Framework for Cryptanalysis of the Bluetooth E0 cipher , 2005 . Cryptology ePrint Archive, Report 2005\/107. O. Levy and A. Wool. A Uniform Framework for Cryptanalysis of the Bluetooth E0 cipher, 2005. Cryptology ePrint Archive, Report 2005\/107."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_25"},{"volume-title":"Bluetooth Technology -- What are the Applications?","year":"2006","key":"e_1_3_2_1_21_1","unstructured":"Mobileinfo.com. Bluetooth Technology -- What are the Applications? , 2006 . http:\/\/www.mobileinfo.com\/Bluetooth\/applic.htm. Mobileinfo.com. Bluetooth Technology -- What are the Applications?, 2006. http:\/\/www.mobileinfo.com\/Bluetooth\/applic.htm."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637244"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_19"},{"volume-title":"Bluetooth technology: what is it, how does it work, and what can I do with it?","year":"2006","key":"e_1_3_2_1_25_1","unstructured":"Palm. Bluetooth technology: what is it, how does it work, and what can I do with it? , 2006 . http:\/\/kb.palmone.com\/SRVS\/CGI-BIN\/WEBCGI.EXE New ,Kb=PalmSupportKB,ts=Palm_External2001,case=obj(20821). Palm. Bluetooth technology: what is it, how does it work, and what can I do with it?, 2006. http:\/\/kb.palmone.com\/SRVS\/CGI-BIN\/WEBCGI.EXE New,Kb=PalmSupportKB,ts=Palm_External2001,case=obj(20821)."},{"key":"e_1_3_2_1_26_1","unstructured":"PCWorld. What's Cooking? Bluetooth Hits the Kitchen 2002. http:\/\/www.pcworld.com\/news\/article\/0 aid 95223 00.asp.  PCWorld. What's Cooking? Bluetooth Hits the Kitchen 2002. http:\/\/www.pcworld.com\/news\/article\/0 aid 95223 00.asp."},{"key":"e_1_3_2_1_27_1","volume-title":"Bluetooth to Outship Wi-Fi Five to One","author":"Register T.","year":"2003","unstructured":"T. Register . Bluetooth to Outship Wi-Fi Five to One , 2003 . http:\/\/www.theregister.co.uk\/2003\/06\/18\/bluetooth_to_outship_wifi_five\/ T. Register. Bluetooth to Outship Wi-Fi Five to One, 2003. http:\/\/www.theregister.co.uk\/2003\/06\/18\/bluetooth_to_outship_wifi_five\/"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067170.1067176"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. of 2002 USENIX Security Symposium","author":"Staniford S.","year":"2002","unstructured":"S. Staniford , V. Paxson , and N. Weaver . How to 0wn the internet in your spare time . In Proc. of 2002 USENIX Security Symposium , 2002 . S. Staniford, V. Paxson, and N. Weaver. How to 0wn the internet in your spare time. In Proc. of 2002 USENIX Security Symposium, 2002."},{"key":"e_1_3_2_1_30_1","volume-title":"Blue Fang","author":"Whitehouse O.","year":"2004","unstructured":"O. Whitehouse . Bluetooth : Red Fang , Blue Fang , 2004 . http:\/\/www.cansecwest.com\/csw04\/csw04-Whitehouse.pdf. O. Whitehouse. Bluetooth: Red Fang, Blue Fang, 2004. http:\/\/www.cansecwest.com\/csw04\/csw04-Whitehouse.pdf."},{"volume-title":"Compartmental models in epidemiology","year":"2006","key":"e_1_3_2_1_31_1","unstructured":"Wikipedia. Compartmental models in epidemiology , 2006 . http:\/\/en.wikipedia.org\/wiki\/Compartmental_models_in_epidemiology. Wikipedia. Compartmental models in epidemiology, 2006. http:\/\/en.wikipedia.org\/wiki\/Compartmental_models_in_epidemiology."}],"event":{"name":"CCS06: 13th ACM Conference on Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS06"},"container-title":["Proceedings of the 4th ACM workshop on Recurring malcode"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1179542.1179545","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1179542.1179545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:45Z","timestamp":1750278165000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1179542.1179545"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,11,3]]},"references-count":30,"alternative-id":["10.1145\/1179542.1179545","10.1145\/1179542"],"URL":"https:\/\/doi.org\/10.1145\/1179542.1179545","relation":{},"subject":[],"published":{"date-parts":[[2006,11,3]]},"assertion":[{"value":"2006-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}