Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Security Analysis of the Previous: Acknowledgments

Bibliography

1
W. Arbaugh, D. Farber, and J. Smith, ``A Secure and Reliable Bootstrap Architecture,'' IEEE Security and Privacy Conference, May 1997.

2
ARM, Ltd., ``Motorola's DragonBall Processor Portfolio to Include ARM Architecture in 2001,'' Press Release, December 11, 2000.

3
D. Balfanz and E. Felten, ``Hand-Held Computers Can Be Better Smart Cards,'' 8th USENIX Security Symposium, Washington, D.C., August 1999.

4
D. Chaum, ``Design Concepts for Tamper Responding Systems,'' Advances in Cryptology: Proceedings of Crypto '83, 1984.

5
E. Chien, ``Malicious Threats to PDAs & Prototype Solutions,'' Virus Bulletin Conference 2000, September 2000.

6
A.J. Clark, ``Physical Protection of Cryptographic Devices,'' Advances in Cryptology: EUROCRYPT '87, 1988.

7
I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer, ``A Secure Environment for Untrusted Helper Applications,'' 6th USENIX Security Symposium, San Jose, California, July 1996.

8
P. Gutmann, ``An Open-Source Cryptographic Coprocessor,'' 9th USENIX Security Symposium, Denver, Colorado, August 2000.

9
T. Harbaum, ``Flashlib,'' April 1999, https://bodotill.suburbia.com.au/
flashy/flashy.html.

10
T. Harbaum, ``OS Flash,'' September 2000, https://bodotill.suburbia.com.au/
osflash/osflash.html.

11
IDC, ``Market Mayhem: The Smart Handheld Devices Market Forecast and Analysis, 1999-2004,'' Report 22430, June, 2000.

12
I. Jermyn, A. Mayer, F. Monrose, M. Reiter, A. Rubin, ``The Design and Analysis of Graphical Passwords,'' 8th USENIX Security Symposium, Washington, D.C., August 1999.

13
E. Keyes, ``Hacking the Pilot: Bypassing the Palm OS,'' PDA Developers 4.6, November 1996.

14
Kingpin, ``Palm OS Beam Bit Modification Tool,'' January 1999, https://www.atstake.com/research/tools/
beamcrack.zip.

15
Kingpin, ``Palm OS Password Retrieval and Decoding,'' @stake Security Advisory, September 26, 2000, https://www.atstake.com/research/
advisories/2000/a092600-1.txt.

16
Kingpin, ``Palm OS Password Lockout Bypass,'' @stake Security Advisory, March 1, 2001, https://www.atstake.com/research/
advisories/2001/a030101-1.txt.

17
D. Klein, ``Foiling the cracker: A survey of, and improvements to, password security,'' 2nd USENIX Security Workshop, August 1990.

18
McAfee.com, ``Increased Protection for Wireless Users in Wake of Recent PDA Trojan Discovery,'' Press Release, September 5, 2001.

19
United States General Accounting Office, Report to the Chairman, Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce - House of Representatives, ``Virus Highlights Need for Improved Internet Management,'' GAO/IMTEC-89-57, June 1989.

20
Palm, Inc., Palm OS Programmer's Companion, DN 3004-003.

21
Palm, Inc., Palm OS Programming Development Tools Guide, DN 3011-002.

22
Palm, Inc., Palm OS SDK Reference, DN 3003-003.

23
W. T. Polk and L. E. Bassham, ``A Guide to the Selection of Anti-Virus Tools and Techniques,'' National Institute of Standards and Technology Computer Security Division, SP 800-5, December 1995.

24
N. Provos, ``Encrypting Virtual Memory,'' 9th USENIX Security Symposium, Denver, Colorado, August 2000.

25
B. Schneier, ``The Trojan Horse Race,'' Communications of the ACM, Volume 42, Number 9, September 1999.

26
S.W. Smith and S.H. Weingart, ``Building a High-Performance, Programmable Secure Coprocessor,'' Computer Networks (Special Issue on Computer Network Security), 31: 831-860, April 1999.

27
TRG Products, Inc., ``FlashPro,'' https://www.trgnet.com/cat-flashpro.htm

28
University of Michigan, ``Smart Card Research At CITI,'' https://www.citi.umich.edu/projects/
smartcard.


Kingpin
2001-05-09