{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:31Z","timestamp":1763507731889,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1815883"],"award-info":[{"award-number":["CNS-1815883"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","award":["2846.001"],"award-info":[{"award-number":["2846.001"]}],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3326310","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"318-319","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Basebads: Automated security analysis of baseband firmware"],"prefix":"10.1145","author":[{"given":"Grant","family":"Hernandez","sequence":"first","affiliation":[{"name":"University of Florida"}]},{"given":"Kevin R. B.","family":"Butler","sequence":"additional","affiliation":[{"name":"University of Florida"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98989-1_2"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23313"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.45"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00038"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23166"},{"volume-title":"Proceedings of the 20th USENIX Conference on Security (SEC'11)","year":"2011","author":"Mulliner Collin","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","first-page":"31","article-title":"Fuzzing the Phone in your Phone","volume":"25","author":"Mulliner Collin","year":"2009","journal-title":"Black Hat USA"},{"key":"e_1_3_2_1_8_1","unstructured":"Nico Golde. 2018. There's Life in the Old Dog Yet: Tearing New Holes into Intel\/iPhone Cellular Modems. (April 2018). https:\/\/comsecuris.com\/blog\/posts\/theres_life_in_the_old_dog_yet_tearing_new_holes_into_inteliphone_cellular_modems\/ Comsecuris Blog.  Nico Golde. 2018. There's Life in the Old Dog Yet: Tearing New Holes into Intel\/iPhone Cellular Modems. (April 2018). https:\/\/comsecuris.com\/blog\/posts\/theres_life_in_the_old_dog_yet_tearing_new_holes_into_inteliphone_cellular_modems\/ Comsecuris Blog."},{"volume-title":"Proceedings of the 10th USENIX Conference on Offensive Technologies (WOOT'16)","year":"2016","author":"Rupprecht David","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653690"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04897-0_12"},{"volume-title":"Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks.. In WOOT. 12--21.","year":"2012","author":"Weinmann Ralf-Philipp","key":"e_1_3_2_1_12_1"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Miami Florida","acronym":"WiSec '19"},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3326310","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3326310","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3326310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3326310"}},"subtitle":["poster"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":12,"alternative-id":["10.1145\/3317549.3326310","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3326310","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}