{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:30:44Z","timestamp":1725528644857},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/cicsyn.2013.58","type":"proceedings-article","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T11:40:27Z","timestamp":1376480427000},"page":"165-170","source":"Crossref","is-referenced-by-count":1,"title":["A Fuzzing Framework for the Security Evaluation of NDEF Message Format"],"prefix":"10.1109","author":[{"given":"Pasquale","family":"Stirparo","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Identification Cards-Contactless Integrated Circuit Cards-Proximity Cards","year":"2001","key":"19"},{"journal-title":"The Advantage of Block-based Protocol Analysis for Security Testing","year":"2002","author":"aitel","key":"35"},{"key":"17","article-title":"Defeating android","author":"miller","year":"2009","journal-title":"ShmooCon"},{"year":"0","key":"36"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684011"},{"journal-title":"Fuzzing for Software Security Testing and Quality Assurance 1st Ed","year":"2008","author":"takanen","key":"33"},{"key":"15","article-title":"Injecting sms messages into smart phones for security analysis","author":"mulliner","year":"2009","journal-title":"Proceedings of the 3rd USENIX Workshop on Offensive Technologies (WOOT)"},{"journal-title":"Fuzzing Brute Force Vulnerability Discovery","year":"2007","author":"sutton","key":"34"},{"key":"16","article-title":"SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale","author":"mulliner","year":"2011","journal-title":"Proceedings of the 20th USENIX Security Symposium"},{"key":"13","first-page":"283","article-title":"A record composition\/ decomposition attack on the ndef signature record type definition","author":"saeed","year":"2011","journal-title":"Internet Technology and Secured Transactions (ICITST) 2011 International Conference for"},{"journal-title":"Fuzzing the Phone in Your Phone","year":"2009","author":"miller","key":"14"},{"year":"0","key":"37"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2010.10"},{"year":"0","key":"38"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2011.9"},{"journal-title":"Near Field Communication Interface and Protocol (NFCIP-1)","year":"2004","key":"21"},{"journal-title":"Identification Cards - Contactless Integrated Circuit(s) Cards -Vicinity Cards","year":"2000","key":"20"},{"journal-title":"Near Field Communication Interface and Protocol (NFCIP - 2)","year":"2004","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.105"},{"key":"24","article-title":"Security in near field communication (nfc)","author":"haselsteiner","year":"2006","journal-title":"Workshop on RFID Security"},{"journal-title":"Cryptography Standard Using ECDH and AES","year":"2008","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1002\/9781119965794"},{"journal-title":"NFC Data Exchange Format (NDEF) Rev 1 0 NFC Forum Technical Specification","year":"2006","key":"27"},{"journal-title":"URI Record Type Definition Rev 1 0 NFC Forum Technical Specification","year":"2006","key":"28"},{"journal-title":"Smart Poster Record Type Definition Rev 1 1 NFC Forum Technical Specification","year":"2006","key":"29"},{"year":"0","key":"3"},{"journal-title":"Nfc Adoption Forecast","year":"0","key":"2"},{"journal-title":"Signature Record Type Definition Rev 1 0 NFC Forum Technical Specification","year":"2010","key":"10"},{"journal-title":"Sales of Mobile Devices in Second Quarter of 2011 Grew 16 5 Percent Year-on-year Smartphone Sales Grew 74 Percent","year":"0","key":"1"},{"journal-title":"NFC Record Type Definition (RTD) Rev 1 0 NFC Forum Technical Specification","year":"2006","key":"30"},{"key":"7","article-title":"Vulnerability analysis and attacks on nfcenabled mobile phones","author":"mulliner","year":"2009","journal-title":"Proceedings of the 1st International Workshop on Sensor Security (IWSS) at ARES"},{"year":"0","key":"6"},{"journal-title":"Gray Hat Python Python Programming for Hackers and Reverse Engineers","year":"2009","author":"seitz","key":"32"},{"journal-title":"Lookout Mobile Threat Report","year":"2011","key":"5"},{"journal-title":"IEEE Standard Glossary of Software Engineering Terminology","first-page":"1","year":"1990","key":"31"},{"journal-title":"Google Wallet","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2011.16"},{"journal-title":"Hacking Nfc and Ndef","year":"2011","author":"mulliner","key":"8"}],"event":{"name":"2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN)","start":{"date-parts":[[2013,6,5]]},"location":"Madrid, Spain","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6569033\/6571321\/06571360.pdf?arnumber=6571360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T16:41:58Z","timestamp":1490200918000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6571360\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/cicsyn.2013.58","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}