S. Cksn and R. , Authentication and key agreement Dedicated channel acquisition References 1. 3GPP: TS 23.401 ? General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access

A. Armando, A. Merlo, M. Migliardi, and L. Verderame, Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures)
DOI : 10.1007/978-3-642-30436-1_2

URL : https://hal.archives-ouvertes.fr/hal-01518240

A. Armando, A. Merlo, M. Migliardi, and L. Verderame, Breaking and fixing the Android Launching Flow, Computers & Security, vol.39, issue.0, 2013.
DOI : 10.1016/j.cose.2013.03.009

A. Castiglione, G. Cattaneo, M. Cembalo, A. De-santis, P. Faruolo et al., Engineering a secure mobile messaging framework, Computers & Security, vol.31, issue.6, pp.771-781, 2012.
DOI : 10.1016/j.cose.2012.06.004

A. Castiglione, G. Cattaneo, G. De-maio, and F. Petagna, SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.520-526, 2011.
DOI : 10.1109/IMIS.2011.65

A. Castiglione, G. Cattaneo, A. De-santis, F. Petagna, and U. Ferraro-petrillo, SPEECH: Secure Personal End-to-End Communication with Handheld, ISSE 2006, Securing Electronic Busines Processes, pp.287-297978, 2006.
DOI : 10.1007/978-3-8348-9195-2_31

A. Castiglione, R. De-prisco, and A. De-santis, Do You Trust Your Phone?, Commerce and Web Technologies, pp.50-61978, 2009.
DOI : 10.1109/MSP.2009.29

A. Castiglione, R. De-prisco, A. De-santis, U. Fiore, and F. Palmieri, A botnet-based command and control approach relying on swarm intelligence, Journal of Network and Computer Applications, vol.38, issue.0, 2013.
DOI : 10.1016/j.jnca.2013.05.002

D. Santis, A. Castiglione, A. Cattaneo, G. Cembalo, M. Petagna et al., An Extensible Framework for Efficient Secure SMS, 2010 International Conference on Complex, Intelligent and Software Intensive Systems, pp.843-850, 2010.
DOI : 10.1109/CISIS.2010.81

K. Derr, Nightmares with Mobile Devices are Just around the Corner!, 2007 IEEE International Conference on Portable Information Devices, pp.1-5, 2007.
DOI : 10.1109/PORTABLE.2007.14

URL : http://www.osti.gov/scitech/servlets/purl/911859

C. Doukas, T. Pliakas, and I. Maglogiannis, Mobile healthcare information management utilizing Cloud Computing and Android OS, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology, pp.1037-1040, 2010.
DOI : 10.1109/IEMBS.2010.5628061

A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, A survey of mobile malware in the wild, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pp.3-14, 2011.
DOI : 10.1145/2046614.2046618

C. Fleizach, M. Liljenstam, P. Johansson, G. M. Voelker, and A. Mehes, Can you infect me now?, Proceedings of the 2007 ACM workshop on Recurring malcode, WORM '07, pp.61-68, 2007.
DOI : 10.1145/1314389.1314402

N. Gobbo, A. Merlo, and M. Migliardi, Attacking the attach procedure in cellular networks, Journal of Ambient Intelligence and Humanized Computing, issue.0, 2014.

C. Guo, H. J. Wang, and W. Zhu, Smart-phone attacks and defenses, p.HotNets III, 2004.

G. Heine and M. Horrer, GSM networks: protocols, terminology, and implementation, 1999.

G. Kambourakis, C. Kolias, S. Gritzalis, and J. Hyuk-park, Signaling-Oriented DoS Attacks in UMTS Networks, Advances in Information Security and Assurance, pp.280-289, 2009.
DOI : 10.1007/11542322_12

M. Khan, A. Ahmed, and A. R. Cheema, Vulnerabilities of UMTS Access Domain Security Architecture, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp.350-355, 2008.
DOI : 10.1109/SNPD.2008.78

N. Kuntagod and C. Mukherjee, Mobile decision support system for outreach health worker, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, pp.56-59, 2011.
DOI : 10.1109/HEALTH.2011.6026786

M. Migliardi and M. Gaudina, Memory Support Through Pervasive and Mobile Systems, Inter-Cooperative Collective Intelligence: Techniques and Applications. In: Studies in Computational Intelligence, 2013.
DOI : 10.1007/978-3-642-35016-0_9

C. Mulliner and J. P. Seifert, Rise of the iBots: Owning a telco network, 2010 5th International Conference on Malicious and Unwanted Software, pp.71-80, 2010.
DOI : 10.1109/MALWARE.2010.5665790

C. Tacconi, S. Mellone, and L. Chiari, Smartphone-Based Applications for Investigating Falls and Mobility, Proceedings of the 5th International ICST Conference on Pervasive Computing Technologies for Healthcare, pp.258-261, 2011.
DOI : 10.4108/icst.pervasivehealth.2011.246060

P. Traynor, W. Enck, P. Mcdaniel, L. Porta, and T. , Mitigating attacks on open functionality in SMS-capable cellular networks, Proceedings of the 12th annual international conference on Mobile computing and networking , MobiCom '06, pp.182-193, 2006.
DOI : 10.1145/1161089.1161111

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.9317

P. Traynor, M. Lin, M. Ongtang, V. Rao, T. Jaeger et al., On cellular botnets, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.223-234, 2009.
DOI : 10.1145/1653662.1653690

P. Traynor, P. Mcdaniel, L. Porta, and T. , On attack causality in internetconnected cellular networks, Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp.1-16, 2007.

M. Y. Wang, J. K. Zao, P. Tsai, and J. Liu, Wedjat: a mobile phone based medicine intake reminder and monitor, Ninth IEEE International Conference on, pp.423-430, 2009.
DOI : 10.1109/bibe.2009.60

URL : https://ir.nctu.edu.tw:443/bitstream/11536/17350/1/000277202300069.pdf