Next: About this document ...
Up: Security Analysis of the
Previous: Acknowledgments
- 1
- W. Arbaugh, D. Farber, and J. Smith, ``A Secure and Reliable Bootstrap Architecture,'' IEEE Security and Privacy Conference, May 1997.
- 2
- ARM, Ltd., ``Motorola's DragonBall Processor Portfolio to Include ARM Architecture in 2001,'' Press Release, December 11, 2000.
- 3
- D. Balfanz and E. Felten, ``Hand-Held Computers Can Be Better Smart Cards,'' 8th USENIX Security Symposium, Washington, D.C., August 1999.
- 4
- D. Chaum, ``Design Concepts for Tamper Responding Systems,'' Advances in Cryptology: Proceedings of Crypto '83, 1984.
- 5
- E. Chien, ``Malicious Threats to PDAs & Prototype Solutions,'' Virus Bulletin Conference 2000, September 2000.
- 6
- A.J. Clark, ``Physical Protection of Cryptographic Devices,'' Advances in Cryptology: EUROCRYPT '87, 1988.
- 7
- I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer, ``A Secure Environment for Untrusted Helper Applications,'' 6th USENIX Security Symposium, San Jose, California, July 1996.
- 8
- P. Gutmann, ``An Open-Source Cryptographic Coprocessor,'' 9th USENIX Security Symposium, Denver, Colorado, August 2000.
- 9
- T. Harbaum, ``Flashlib,'' April 1999,
https://bodotill.suburbia.com.au/
flashy/flashy.html
.
- 10
- T. Harbaum, ``OS Flash,'' September 2000,
https://bodotill.suburbia.com.au/
osflash/osflash.html
.
- 11
- IDC, ``Market Mayhem: The Smart Handheld Devices Market Forecast and Analysis, 1999-2004,'' Report 22430, June, 2000.
- 12
- I. Jermyn, A. Mayer, F. Monrose, M. Reiter, A. Rubin, ``The Design and Analysis of Graphical Passwords,'' 8th USENIX Security Symposium, Washington, D.C., August 1999.
- 13
- E. Keyes, ``Hacking the Pilot: Bypassing the Palm OS,'' PDA Developers 4.6, November 1996.
- 14
- Kingpin, ``Palm OS Beam Bit Modification Tool,'' January 1999,
https://www.atstake.com/research/tools/
beamcrack.zip
.
- 15
- Kingpin, ``Palm OS Password Retrieval and Decoding,'' @stake Security Advisory, September 26, 2000,
https://www.atstake.com/research/
advisories/2000/a092600-1.txt
.
- 16
- Kingpin, ``Palm OS Password Lockout Bypass,'' @stake Security Advisory, March 1, 2001,
https://www.atstake.com/research/
advisories/2001/a030101-1.txt
.
- 17
- D. Klein, ``Foiling the cracker: A survey of, and improvements to, password security,'' 2nd USENIX Security Workshop, August 1990.
- 18
- McAfee.com, ``Increased Protection for Wireless Users in Wake of Recent PDA Trojan Discovery,'' Press Release, September 5, 2001.
- 19
- United States General Accounting Office, Report to the Chairman, Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce - House of Representatives, ``Virus Highlights Need for Improved Internet Management,'' GAO/IMTEC-89-57, June 1989.
- 20
- Palm, Inc., Palm OS Programmer's Companion, DN 3004-003.
- 21
- Palm, Inc., Palm OS Programming Development Tools Guide, DN 3011-002.
- 22
- Palm, Inc., Palm OS SDK Reference, DN 3003-003.
- 23
- W. T. Polk and L. E. Bassham, ``A Guide to the Selection of Anti-Virus Tools and Techniques,'' National Institute of Standards and Technology Computer Security Division, SP 800-5, December 1995.
- 24
- N. Provos, ``Encrypting Virtual Memory,'' 9th USENIX Security Symposium, Denver, Colorado, August 2000.
- 25
- B. Schneier, ``The Trojan Horse Race,'' Communications of the ACM, Volume 42, Number 9, September 1999.
- 26
- S.W. Smith and S.H. Weingart, ``Building a High-Performance, Programmable Secure Coprocessor,'' Computer Networks (Special Issue on Computer Network Security), 31: 831-860, April 1999.
- 27
- TRG Products, Inc., ``FlashPro,''
https://www.trgnet.com/cat-flashpro.htm
- 28
- University of Michigan, ``Smart Card Research At CITI,''
https://www.citi.umich.edu/projects/
smartcard
.
Kingpin
2001-05-09