{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:28Z","timestamp":1763507728349,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1657124 and CNS-1719369"],"award-info":[{"award-number":["CNS-1657124 and CNS-1719369"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Intel"},{"name":"NSF\/Intel ICN-WEN program"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359833","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"529-543","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Opening Pandora's box through ATFuzzer"],"prefix":"10.1145","author":[{"given":"Imtiaz","family":"Karim","sequence":"first","affiliation":[{"name":"Purdue University"}]},{"given":"Fabrizio","family":"Cicala","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Syed Rafiul","family":"Hussain","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Omar","family":"Chowdhury","sequence":"additional","affiliation":[{"name":"University of Iowa"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. AT Commands For CDMA Wireless Modems. http:\/\/www.canarysystems.com\/nsupport\/CDMA_AT_Commands.pdf.  [n.d.]. AT Commands For CDMA Wireless Modems. http:\/\/www.canarysystems.com\/nsupport\/CDMA_AT_Commands.pdf."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"[n.d.]. CVE-2016-4030. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-4030.  [n.d.]. CVE-2016-4030. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-4030.","DOI":"10.1149\/MA2016-02\/53\/4030"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"[n.d.]. CVE-2016-4031. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-4031.  [n.d.]. CVE-2016-4031. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-4031.","DOI":"10.1149\/MA2016-02\/53\/4031"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"[n.d.]. CVE-2016-4032. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-4032.  [n.d.]. CVE-2016-4032. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-4032.","DOI":"10.1149\/MA2016-02\/53\/4032"},{"key":"e_1_3_2_1_5_1","unstructured":"[n.d.]. CVE-2019-16400. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-16400.  [n.d.]. CVE-2019-16400. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-16400."},{"key":"e_1_3_2_1_6_1","unstructured":"[n.d.]. CVE-2019-16401. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-16401.  [n.d.]. CVE-2019-16401. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-16401."},{"volume-title":"CWE-325: Missing Required Cryptographic Step - CVE-2018-5383","key":"e_1_3_2_1_7_1","unstructured":"[n.d.]. CWE-325: Missing Required Cryptographic Step - CVE-2018-5383 . In Cernegie Mellon University, CERT Coordination Center . https:\/\/www.kb.cert.org\/vuls\/id\/304725\/. [n.d.]. CWE-325: Missing Required Cryptographic Step - CVE-2018-5383. In Cernegie Mellon University, CERT Coordination Center. https:\/\/www.kb.cert.org\/vuls\/id\/304725\/."},{"volume-title":"Digital cellular telecommunications system (Phase 2+)","year":"1998","key":"e_1_3_2_1_8_1","unstructured":"[n.d.]. Digital cellular telecommunications system (Phase 2+) ; AT Command set for GSM Mobile Equipment (ME) (3GPP TS 07.07 version 7.8.0 Release 1998 ). https:\/\/www.etsi.org\/deliver\/etsi_ts\/100900_100999\/100916\/07.08.00_60\/ts_100916v070800p.pdf. [n.d.]. Digital cellular telecommunications system (Phase 2+); AT Command set for GSM Mobile Equipment (ME) (3GPP TS 07.07 version 7.8.0 Release 1998). https:\/\/www.etsi.org\/deliver\/etsi_ts\/100900_100999\/100916\/07.08.00_60\/ts_100916v070800p.pdf."},{"volume-title":"Digital cellular telecommunications system (Phase 2+) (GSM)","key":"e_1_3_2_1_9_1","unstructured":"[n.d.]. Digital cellular telecommunications system (Phase 2+) (GSM) ; Universal Mobile Telecommunications System (UMTS); LTE; AT command set for User Equipment (UE) (3GPP TS 27.007 version 13.6.0 Release 13). https:\/\/www.etsi.org\/deliver\/etsi_ts\/127000_127099\/127007\/13.06.00_60\/ts_127007v130600p.pdf. [n.d.]. Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; AT command set for User Equipment (UE) (3GPP TS 27.007 version 13.6.0 Release 13). https:\/\/www.etsi.org\/deliver\/etsi_ts\/127000_127099\/127007\/13.06.00_60\/ts_127007v130600p.pdf."},{"volume-title":"Digital cellular telecommunications system (Phase 2+)","key":"e_1_3_2_1_10_1","unstructured":"[n.d.]. Digital cellular telecommunications system (Phase 2+) ; Specification of the Subscriber Identity Module -Mobile Equipment (SIM-ME) interface (3GPP TS 51.011 version 4.15.0 Release 4). https:\/\/www.etsi.org\/deliver\/etsi_TS\/151000_151099\/151011\/04.15.00_60\/ts_151011v041500p.pdf. [n.d.]. Digital cellular telecommunications system (Phase 2+); Specification of the Subscriber Identity Module -Mobile Equipment (SIM-ME) interface (3GPP TS 51.011 version 4.15.0 Release 4). https:\/\/www.etsi.org\/deliver\/etsi_TS\/151000_151099\/151011\/04.15.00_60\/ts_151011v041500p.pdf."},{"key":"e_1_3_2_1_11_1","unstructured":"[n.d.]. Digital cellular telecommunications system (Phase 2+) Universal Mobile Telecommunications System UMTS LTE AT command set for User Equipment UE. https:\/\/www.etsi.org\/deliver\/etsi_ts\/127000_127099\/127007\/10.03.00_60\/ts_127007v100300p.pdf.  [n.d.]. Digital cellular telecommunications system (Phase 2+) Universal Mobile Telecommunications System UMTS LTE AT command set for User Equipment UE. https:\/\/www.etsi.org\/deliver\/etsi_ts\/127000_127099\/127007\/10.03.00_60\/ts_127007v100300p.pdf."},{"volume-title":"Digital cellular telecommunications system (Phase 2+)","key":"e_1_3_2_1_12_1","unstructured":"[n.d.]. Digital cellular telecommunications system (Phase 2+) ; Use of Data Terminal Equipment - Data Circuit terminating; Equipment (DTE - DCE) interface for Short Message Service (SMS) and Cell Broadcast Service (CBS) (GSM 07.05 version 5.3.0). https:\/\/www.etsi.org\/deliver\/etsi_gts\/07\/0705\/05.03.00_60\/gsmts_0705v050300p.pdf. [n.d.]. Digital cellular telecommunications system (Phase 2+); Use of Data Terminal Equipment - Data Circuit terminating; Equipment (DTE - DCE) interface for Short Message Service (SMS) and Cell Broadcast Service (CBS) (GSM 07.05 version 5.3.0). https:\/\/www.etsi.org\/deliver\/etsi_gts\/07\/0705\/05.03.00_60\/gsmts_0705v050300p.pdf."},{"key":"e_1_3_2_1_13_1","unstructured":"[n.d.]. EVDO and CDMA AT Commands Reference Guide. https:\/\/www.multitech.com\/documents\/publications\/manuals\/s000546.pdf.  [n.d.]. EVDO and CDMA AT Commands Reference Guide. https:\/\/www.multitech.com\/documents\/publications\/manuals\/s000546.pdf."},{"key":"e_1_3_2_1_14_1","unstructured":"[n.d.]. HUAWEI MU609 HSPA LGA Module Application Guide. https:\/\/www.paoli.cz\/out\/media\/HUAWEI_MU609_HSPA_LGA_Module_Application_Guide_V100R002_02(1).pdf.  [n.d.]. HUAWEI MU609 HSPA LGA Module Application Guide. https:\/\/www.paoli.cz\/out\/media\/HUAWEI_MU609_HSPA_LGA_Module_Application_Guide_V100R002_02(1).pdf."},{"key":"e_1_3_2_1_15_1","unstructured":"[n.d.]. jsfunfuzz [online]. https:\/\/github.com\/MozillaSecurity\/funfuzz\/tree\/master\/src\/funfuzz\/js\/jsfunfuzz.  [n.d.]. jsfunfuzz [online]. https:\/\/github.com\/MozillaSecurity\/funfuzz\/tree\/master\/src\/funfuzz\/js\/jsfunfuzz."},{"key":"e_1_3_2_1_16_1","unstructured":"[n.d.]. Mangleme [Online]. https:\/\/github.com\/WebKit\/webkit\/tree\/master\/Tools\/mangleme.  [n.d.]. Mangleme [Online]. https:\/\/github.com\/WebKit\/webkit\/tree\/master\/Tools\/mangleme."},{"key":"e_1_3_2_1_17_1","unstructured":"[n.d.]. Motorola AT Command Set. https:\/\/ipfs.io\/ipfs\/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco\/wiki\/Motorola_phone_AT_commands.html.  [n.d.]. Motorola AT Command Set. https:\/\/ipfs.io\/ipfs\/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco\/wiki\/Motorola_phone_AT_commands.html."},{"key":"e_1_3_2_1_18_1","unstructured":"[n.d.]. Neo 1973 and Neo FreeRunner GSM modem AT Command set. http:\/\/wiki.openmoko.org\/wiki\/Neo_1973_and_Neo_FreeRunner_gsm_modem.  [n.d.]. Neo 1973 and Neo FreeRunner GSM modem AT Command set. http:\/\/wiki.openmoko.org\/wiki\/Neo_1973_and_Neo_FreeRunner_gsm_modem."},{"key":"e_1_3_2_1_19_1","unstructured":"[n.d.]. Peach Fuzzer Platform [online]. https:\/\/www.peach.tech\/.  [n.d.]. Peach Fuzzer Platform [online]. https:\/\/www.peach.tech\/."},{"key":"e_1_3_2_1_20_1","unstructured":"[n.d.]. Radamsa [online]. https:\/\/gitlab.com\/akihe\/radamsa.  [n.d.]. Radamsa [online]. https:\/\/gitlab.com\/akihe\/radamsa."},{"key":"e_1_3_2_1_21_1","unstructured":"[n.d.]. Sony Erricsson AT Command set. https:\/\/www.activexperts.com\/sms-component\/at\/sonyericsson\/.  [n.d.]. Sony Erricsson AT Command set. https:\/\/www.activexperts.com\/sms-component\/at\/sonyericsson\/."},{"key":"e_1_3_2_1_22_1","unstructured":"[n.d.]. Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Hayes_command_set.  [n.d.]. Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Hayes_command_set."},{"key":"e_1_3_2_1_23_1","unstructured":"[n.d.]. XDA Forum [online]. https:\/\/forum.xda-developers.com\/galaxy-s2\/help\/how-to-talk-to-modem-commands-t1471241.  [n.d.]. XDA Forum [online]. https:\/\/forum.xda-developers.com\/galaxy-s2\/help\/how-to-talk-to-modem-commands-t1471241."},{"volume-title":"The bluebug","author":"Laurie M. Herfurt A.","key":"e_1_3_2_1_24_1","unstructured":"M. Herfurt A. Laurie , M. Holtmann . [n.d.]. The bluebug . AL Digital Ltd . https:\/\/trifinite.org\/trifinite_stuff_bluebug.html#introduction. M. Herfurt A. Laurie, M. Holtmann. [n.d.]. The bluebug. AL Digital Ltd. https:\/\/trifinite.org\/trifinite_stuff_bluebug.html#introduction."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21771-5_30"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23412"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00040"},{"volume-title":"11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17).","author":"Hay Roee","key":"e_1_3_2_1_29_1","unstructured":"Roee Hay . 2017. fastboot oem vuln: android bootloader vulnerabilities in vendor customizations . In 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17). Roee Hay. 2017. fastboot oem vuln: android bootloader vulnerabilities in vendor customizations. In 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17)."},{"key":"e_1_3_2_1_30_1","volume-title":"https:\/\/www.docdroid.net\/dxKUj5c\/attacking-nexus-6-6p-custom-bootmodes.pdf","author":"Hay Roee","year":"2017","unstructured":"Roee Hay and Michael Goberman . 2017. Attacking Nexus 6 & 6P Custom Bootmodes . ( 2017 ). https:\/\/www.docdroid.net\/dxKUj5c\/attacking-nexus-6-6p-custom-bootmodes.pdf . Roee Hay and Michael Goberman. 2017. Attacking Nexus 6 & 6P Custom Bootmodes. (2017). https:\/\/www.docdroid.net\/dxKUj5c\/attacking-nexus-6-6p-custom-bootmodes.pdf."},{"key":"e_1_3_2_1_31_1","unstructured":"Christian Holler Kim Herzig and Andreas Zeller. [n.d.]. Fuzzing with Code Fragments.  Christian Holler Kim Herzig and Andreas Zeller. [n.d.]. Fuzzing with Code Fragments."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23313"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Syed Rafiul Hussain Mitziu Echeverria Omar Chowdhury Ninghui Li and Elisa Bertino. 2019. Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information. (2019).  Syed Rafiul Hussain Mitziu Echeverria Omar Chowdhury Ninghui Li and Elisa Bertino. 2019. Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information. (2019).","DOI":"10.14722\/ndss.2019.23442"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213874"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_1_38_1","volume-title":"V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing. CoRR abs\/1901.01142","author":"Li Yuwei","year":"2019","unstructured":"Yuwei Li , Shouling Ji , Chenyang Lv , Yuan Chen , Jianhai Chen , Qinchen Gu , and Chunming Wu. 2019. V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing. CoRR abs\/1901.01142 ( 2019 ). arXiv:1901.01142 http:\/\/arxiv.org\/abs\/1901.01142 Yuwei Li, Shouling Ji, Chenyang Lv, Yuan Chen, Jianhai Chen, Qinchen Gu, and Chunming Wu. 2019. V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing. CoRR abs\/1901.01142 (2019). arXiv:1901.01142 http:\/\/arxiv.org\/abs\/1901.01142"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.3390\/jsan7030028"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023662"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_42_1","volume-title":"Fuzzing the Phone in your Phone (Black Hat USA","author":"Mulliner Collin","year":"2009","unstructured":"Collin Mulliner and Charlie Miller . 2009. Fuzzing the Phone in your Phone (Black Hat USA 2009 ). Collin Mulliner and Charlie Miller. 2009. Fuzzing the Phone in your Phone (Black Hat USA 2009)."},{"key":"e_1_3_2_1_43_1","unstructured":"Andr\u00e9 Pereira Manuel Correia and Pedro Brand\u00e3o. 2014. Charge your device with the latest malware.. In BlackHat Europe.  Andr\u00e9 Pereira Manuel Correia and Pedro Brand\u00e3o. 2014. Charge your device with the latest malware.. In BlackHat Europe."},{"volume-title":"Communications and Multimedia Security, Bart De Decker and Andr\u00e9 Z\u00faquete (Eds.)","author":"Pereira Andr\u00e9","key":"e_1_3_2_1_44_1","unstructured":"Andr\u00e9 Pereira , Manuel Correia , and Pedro Brand\u00e3o . 2014. USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations . In Communications and Multimedia Security, Bart De Decker and Andr\u00e9 Z\u00faquete (Eds.) . Springer Berlin Heidelberg , Berlin, Heidelberg , 19--32. Andr\u00e9 Pereira, Manuel Correia, and Pedro Brand\u00e3o. 2014. USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations. In Communications and Multimedia Security, Bart De Decker and Andr\u00e9 Z\u00faquete (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 19--32."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44885-4_2"},{"key":"e_1_3_2_1_46_1","volume-title":"SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities. CoRR abs\/1708.08437","author":"Petsios Theofilos","year":"2017","unstructured":"Theofilos Petsios , Jason Zhao , Angelos D. Keromytis , and Suman Jana . 2017. SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities. CoRR abs\/1708.08437 ( 2017 ). arXiv:1708.08437 http:\/\/arxiv.org\/abs\/1708.08437 Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, and Suman Jana. 2017. SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities. CoRR abs\/1708.08437 (2017). arXiv:1708.08437 http:\/\/arxiv.org\/abs\/1708.08437"},{"key":"e_1_3_2_1_47_1","volume-title":"Alexandru Razvan Caciulescu, and Abhik Roychoudhury","author":"Pham Van-Thuan","year":"2018","unstructured":"Van-Thuan Pham , Marcel B\u00f6hme , Andrew E. Santosa , Alexandru Razvan Caciulescu, and Abhik Roychoudhury . 2018 . Smart Greybox Fuzzing. CoRR abs\/1811.09447 (2018). arXiv:1811.09447 http:\/\/arxiv.org\/abs\/1811.09447 Van-Thuan Pham, Marcel B\u00f6hme, Andrew E. Santosa, Alexandru Razvan Caciulescu, and Abhik Roychoudhury. 2018. Smart Greybox Fuzzing. CoRR abs\/1811.09447 (2018). arXiv:1811.09447 http:\/\/arxiv.org\/abs\/1811.09447"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"e_1_3_2_1_49_1","unstructured":"P. Roberto and F. Aristide. 2014. Modem interface exposed via USB.. In BlackHat Europe. https:\/\/github.com\/ud2\/advisories\/tree\/master\/android\/samsung\/nocve-2016-0004.  P. Roberto and F. Aristide. 2014. Modem interface exposed via USB.. In BlackHat Europe. https:\/\/github.com\/ud2\/advisories\/tree\/master\/android\/samsung\/nocve-2016-0004."},{"key":"e_1_3_2_1_50_1","unstructured":"David Rupprecht Katharina Kohls Thorsten Holz and Christina P\u00f6pper. [n.d.]. Breaking LTE on layer two.  David Rupprecht Katharina Kohls Thorsten Holz and Christina P\u00f6pper. [n.d.]. Breaking LTE on layer two."},{"key":"e_1_3_2_1_51_1","volume-title":"Bluetooth: With low energy comes low security. In Presented as part of the 7th {USENIX} Workshop on Offensive Technologies.","author":"Ryan Mike","year":"2013","unstructured":"Mike Ryan . 2013 . Bluetooth: With low energy comes low security. In Presented as part of the 7th {USENIX} Workshop on Offensive Technologies. Mike Ryan. 2013. Bluetooth: With low energy comes low security. In Presented as part of the 7th {USENIX} Workshop on Offensive Technologies."},{"key":"e_1_3_2_1_52_1","unstructured":"Wireless Solutions Telit. [n.d.]. AT Commands Reference Guide. https:\/\/www.telit.com\/wp-content\/uploads\/2017\/09\/Telit_AT_Commands_Reference_Guide_r24_B.pdf.  Wireless Solutions Telit. [n.d.]. AT Commands Reference Guide. https:\/\/www.telit.com\/wp-content\/uploads\/2017\/09\/Telit_AT_Commands_Reference_Guide_r24_B.pdf."},{"volume-title":"ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Tian Dave","key":"e_1_3_2_1_53_1","unstructured":"Dave (Jing) Tian , Grant Hernandez , Joseph I. Choi , Vanessa Frost , Christie Raules , Patrick Traynor , Hayawardh Vijayakumar , Lee Harrison , Amir Rahmati , Michael Grace , and Kevin R. B. Butler . 2018 . ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem. In 27th USENIX Security Symposium (USENIX Security 18) . Baltimore, MD, 273--290. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/tian. Dave (Jing) Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Christie Raules, Patrick Traynor, Hayawardh Vijayakumar, Lee Harrison, Amir Rahmati, Michael Grace, and Kevin R. B. Butler. 2018. ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem. In 27th USENIX Security Symposium (USENIX Security 18). Baltimore, MD, 273--290. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/tian."},{"key":"e_1_3_2_1_54_1","volume-title":"Computer Security - ESORICS","author":"Veggalam Spandan","year":"2016","unstructured":"Spandan Veggalam , Sanjay Rawat , Istvan Haller , and Herbert Bos . 2016. IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming . In Computer Security - ESORICS 2016 , Ioannis Askoxylakis, Sotiris Ioannidis , Sokratis Katsikas, and Catherine Meadows (Eds.). Springer International Publishing , Cham, 581--601. Spandan Veggalam, Sanjay Rawat, Istvan Haller, and Herbert Bos. 2016. IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming. In Computer Security - ESORICS 2016, Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, and Catherine Meadows (Eds.). Springer International Publishing, Cham, 581--601."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"e_1_3_2_1_56_1","volume-title":"Superion: Grammar-Aware Greybox Fuzzing. CoRR abs\/1812.01197","author":"Wang Junjie","year":"2018","unstructured":"Junjie Wang , Bihuan Chen , Lei Wei , and Yang Liu . 2018 . Superion: Grammar-Aware Greybox Fuzzing. CoRR abs\/1812.01197 (2018). arXiv:1812.01197 http:\/\/arxiv.org\/abs\/1812.01197 Junjie Wang, Bihuan Chen, Lei Wei, and Yang Liu. 2018. Superion: Grammar-Aware Greybox Fuzzing. CoRR abs\/1812.01197 (2018). arXiv:1812.01197 http:\/\/arxiv.org\/abs\/1812.01197"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/CYCON.2015.7158480"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.03.005"},{"key":"e_1_3_2_1_59_1","unstructured":"M. Zalewski. [n.d.]. American fuzzy lop. [online]. http:\/\/lcamtuf.coredump.cx\/afl\/.  M. Zalewski. [n.d.]. American fuzzy lop. [online]. http:\/\/lcamtuf.coredump.cx\/afl\/."}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","acronym":"ACSAC '19","location":"San Juan Puerto Rico USA"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359833","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359833","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359833"}},"subtitle":["dynamic analysis of AT interface for Android smartphones"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":59,"alternative-id":["10.1145\/3359789.3359833","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359833","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}