usnistgov / mobile-threat-catalogue

NIST/NCCoE Mobile Threat Catalogue
https://pages.nist.gov/mobile-threat-catalogue
Other
141 stars 40 forks source link

Remaining broken links #350

Open samz-cs opened 2 years ago

samz-cs commented 2 years ago

replace the following links:

-[^19]: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.16.2068&rep=rep1&type=pdf -[^20]: https://www.lookout.com/blog/spoofed-wifi-60-minutes -[^37]: https://people.inf.ethz.ch/hvogt/proj/btmp3/Datasheets/Bluetooth_11_Specifications_Book.pdf -[^38]: https://www.bluetooth.com/bluetooth-resources/le-security-study-guide/ new -[^52]: https://www.nbcnewyork.com/investigations/sim-swapping-how-the-latest-cellphone-hacking-scam-works-and-how-to-protect-yourself/3686051/ -[^61]: https://docs.broadcom.com/doc/sans-mobile-threat-protection-a-holistic-approach -[^63]: https://web.cse.ohio-state.edu/~lin.3021/file/NDSS14b.pdf -[^65]: https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=442543 -[^69]: delete -[^70]: https://kipdf.com/stumping-the-mobile-chipset_5afc4b768ead0ed8128b4574.html -[^80]: https://wiki.sei.cmu.edu/confluence/pages/viewpage.action?pageId=87150717 -[^82]: https://www.fortiguard.com/psirt_policy -[^88]: https://www.lookout.com/blog/bankmirage -[^89]: http://www.stratusvideo.org/download/stratus_video-ios9_trust.pdf -[^91]: https://www.lookout.com/blog/hacking-team -[^94]: (new) https://news.softpedia.com/news/android-malware-secretly-subscribes-victims-to-premium-sms-services-491264.shtml -[^95]: https://www.zdnet.com/google-amp/article/chinese-android-botnet-netting-millions-says-symantec/ -[^102]: https://www.lookout.com/blog/brain-test-re-emerges -[^114]: https://blog.checkpoint.com/2015/08/06/certifigate/ -[^115]: (new) https://threatpost.com/samsungs-swift-keyboard-update-mechanism-exposes-600m-devices/113348/ -[^127]: https://www.zdnet.com/google-amp/article/ios-9-lockscreen-bypass-exposes-photos-and-contacts/ -[^133]: https://www.globalsecuritymag.com/Marc-Rogers-Loockout-Why-I-hacked,20140923,47611.html -[^134]: https://www.lookout.com/blog/spoofed-wifi-60-minutes -[^136]: https://owasp.org/www-community/attacks/Manipulator-in-the-middle_attack -[^144]: https://dl.acm.org/doi/pdf/10.1145/1920261.1920314?casa_token=5XmsJ5lz06EAAAAA:HavUpmf81lNQ74ooinjWS1BZkQMkfhsbWJwFwa3UEieHGYKTCmv-TSwwaHRQhz-I4XFzdzkDHEOA -[^167]: https://arxiv.org/pdf/1607.05171.pdf -[^188]: https://www.nowsecure.com/blog/2017/09/24/remote-ussd-code-execution-on-android-devices/ -[^193]: https://unit42.paloaltonetworks.com/backstab-mobile-backup-data-under-attack-from-malware/ -[^217]: https://papers.put.as/papers/ios/2013/US-13-Lau-Mactans-Injecting-Malware-into-iOS-Devices-via-Malicious-Chargers-WP.pdf -[^225]: https://www.lookout.com/blog/phone-theft-in-america -[^234]: https://duo.com/resources/infographics/the-state-of-android-security -[^240]: https://www.ndss-symposium.org/wp-content/uploads/2017/09/10_5_slides.pdf -[^S-Konstantaras-1]: https://dokumen.tips/documents/exploiting-vulnerabilities-of-wi-fi-sd-cards-os3nl-vulnerabilities-of-wi-fi-sd.html -[^307]: https://www.srlabs.de/bites/new-sim-attacks -[^309]: https://www.fintechfutures.com/files/2014/04/Secure-Element-Deployment-Host-Card-Emulation-v1.0.pdf -[^310]: https://www.securetechalliance.org/wp-content/uploads/HCE-101-WP-FINAL-081114-clean.pdf