{"id":"https://openalex.org/W3174752549","doi":"https://doi.org/10.1155/2021/9946022","title":"GNFCVulFinder: NDEF Vulnerability Discovering for NFC-Enabled Smart Mobile Devices Based on Fuzzing","display_name":"GNFCVulFinder: NDEF Vulnerability Discovering for NFC-Enabled Smart Mobile Devices Based on Fuzzing","publication_year":2021,"publication_date":"2021-06-28","ids":{"openalex":"https://openalex.org/W3174752549","doi":"https://doi.org/10.1155/2021/9946022","mag":"3174752549"},"language":"en","primary_location":{"id":"doi:10.1155/2021/9946022","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2021/9946022","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/9946022.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2021/9946022.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100404719","display_name":"Zhiqiang Wang","orcid":"https://orcid.org/0000-0002-1789-8414"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiqiang Wang","raw_affiliation_strings":["Beijing Electronic Science and Technology Institute, Cyberspace Security Department, Beijing 100070, China","State Information Center, Post-Doctoral Scientific Research Workstation, Beijing 100045, China"],"raw_orcid":"https://orcid.org/0000-0002-1789-8414","affiliations":[{"raw_affiliation_string":"Beijing Electronic Science and Technology Institute, Cyberspace Security Department, Beijing 100070, China","institution_ids":["https://openalex.org/I202334528"]},{"raw_affiliation_string":"State Information Center, Post-Doctoral Scientific Research Workstation, Beijing 100045, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018771176","display_name":"Yuheng Lin","orcid":"https://orcid.org/0000-0002-6953-2385"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuheng Lin","raw_affiliation_strings":["Beijing Electronic Science and Technology Institute, Cyberspace Security Department, Beijing 100070, China"],"raw_orcid":"https://orcid.org/0000-0002-6953-2385","affiliations":[{"raw_affiliation_string":"Beijing Electronic Science and Technology Institute, Cyberspace Security Department, Beijing 100070, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051950327","display_name":"Zihan Zhuo","orcid":"https://orcid.org/0000-0002-1426-4803"},"institutions":[{"id":"https://openalex.org/I4210100200","display_name":"China Internet Network Information Center","ror":"https://ror.org/011t9p927","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210100200","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zihan Zhuo","raw_affiliation_strings":["National Internet Emergency Center, Beijing 100029, China"],"raw_orcid":"https://orcid.org/0000-0002-1426-4803","affiliations":[{"raw_affiliation_string":"National Internet Emergency Center, Beijing 100029, China","institution_ids":["https://openalex.org/I4210100200"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068433623","display_name":"Jieming Gu","orcid":"https://orcid.org/0000-0002-2466-988X"},"institutions":[{"id":"https://openalex.org/I4210100200","display_name":"China Internet Network Information Center","ror":"https://ror.org/011t9p927","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210100200","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jieming Gu","raw_affiliation_strings":["National Internet Emergency Center, Beijing 100029, China"],"raw_orcid":"https://orcid.org/0000-0002-2466-988X","affiliations":[{"raw_affiliation_string":"National Internet Emergency Center, Beijing 100029, China","institution_ids":["https://openalex.org/I4210100200"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101991199","display_name":"Tao Yang","orcid":"https://orcid.org/0000-0003-2439-0579"},"institutions":[{"id":"https://openalex.org/I1302611135","display_name":"Ministry of Public Security of the People's Republic of China","ror":"https://ror.org/00bt9we26","country_code":"CN","type":"government","lineage":["https://openalex.org/I1302611135"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Yang","raw_affiliation_strings":["Key Lab of Information Network Security, Ministry of Public Security, Shanghai 200031, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Lab of Information Network Security, Ministry of Public Security, Shanghai 200031, China","institution_ids":["https://openalex.org/I1302611135"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5051950327","https://openalex.org/A5100404719"],"corresponding_institution_ids":["https://openalex.org/I202334528","https://openalex.org/I4210100200"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.3087,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.53208305,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9511644840240479},{"id":"https://openalex.org/keywords/near-field-communication","display_name":"Near field communication","score":0.8755285739898682},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8600032329559326},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7148045897483826},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6496307253837585},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6369694471359253},{"id":"https://openalex.org/keywords/bluetooth","display_name":"Bluetooth","score":0.6217941045761108},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.5525781512260437},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.525439441204071},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4941399395465851},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.4561116695404053},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.44092270731925964},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.44083479046821594},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.28645044565200806},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.23121985793113708},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.22653675079345703},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21653074026107788},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.19575035572052002},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.19497406482696533},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1352870762348175},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.11934065818786621}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9511644840240479},{"id":"https://openalex.org/C175604262","wikidata":"https://www.wikidata.org/wiki/Q273353","display_name":"Near field communication","level":3,"score":0.8755285739898682},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8600032329559326},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7148045897483826},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6496307253837585},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6369694471359253},{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.6217941045761108},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.5525781512260437},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.525439441204071},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4941399395465851},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.4561116695404053},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.44092270731925964},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.44083479046821594},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28645044565200806},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.23121985793113708},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.22653675079345703},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21653074026107788},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.19575035572052002},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.19497406482696533},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1352870762348175},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.11934065818786621},{"id":"https://openalex.org/C96122199","wikidata":"https://www.wikidata.org/wiki/Q628096","display_name":"Ultra high frequency","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2021/9946022","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2021/9946022","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/9946022.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ab2bdd4301df409099c0ca6cea2e38ac","is_oa":false,"landing_page_url":"https://doaj.org/article/ab2bdd4301df409099c0ca6cea2e38ac","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2021 (2021)","raw_type":"article"},{"id":"pmh:oai:hindawi.com:10.1155/2021/9946022","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/9946022","pdf_url":null,"source":{"id":"https://openalex.org/S4306400340","display_name":"Hindawi Journal of Chemistry (Hindawi)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210126990","host_organization_name":"Hindawi (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210126990"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Research Article"}],"best_oa_location":{"id":"doi:10.1155/2021/9946022","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2021/9946022","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/9946022.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2886099997","display_name":null,"funder_award_id":"328201909","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G3239145288","display_name":null,"funder_award_id":"3201012","funder_id":"https://openalex.org/F4320330913","funder_display_name":"Beijing Electronic Science and Technology Institute"},{"id":"https://openalex.org/G3467517238","display_name":null,"funder_award_id":"3201012","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G3860903343","display_name":null,"funder_award_id":"2017YFC1201204","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G3896891874","display_name":null,"funder_award_id":"2019M650606","funder_id":"https://openalex.org/F4320330913","funder_display_name":"Beijing Electronic Science and Technology Institute"},{"id":"https://openalex.org/G525011749","display_name":null,"funder_award_id":"2019M650606","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G6317749252","display_name":null,"funder_award_id":"328201909","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G7619061292","display_name":null,"funder_award_id":"2017YFC1201204","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G7623686304","display_name":null,"funder_award_id":"3201012","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G8979606502","display_name":null,"funder_award_id":"2019M650606","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320330913","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3174752549.pdf","grobid_xml":"https://content.openalex.org/works/W3174752549.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W625616531","https://openalex.org/W1030267268","https://openalex.org/W1989391244","https://openalex.org/W2004867681","https://openalex.org/W2033694613","https://openalex.org/W2102791710","https://openalex.org/W2142344425","https://openalex.org/W2152394849","https://openalex.org/W2216041415","https://openalex.org/W2216707029","https://openalex.org/W2383718370","https://openalex.org/W2544622625","https://openalex.org/W2551594732","https://openalex.org/W2757475500","https://openalex.org/W2909889155","https://openalex.org/W3129009507"],"related_works":["https://openalex.org/W2120675930","https://openalex.org/W2392503306","https://openalex.org/W3041665175","https://openalex.org/W2947407508","https://openalex.org/W4393137439","https://openalex.org/W2004278744","https://openalex.org/W2082818071","https://openalex.org/W2892115998","https://openalex.org/W2062583373","https://openalex.org/W2047479118"],"abstract_inverted_index":{"Near-field":[0],"communication":[1,7],"(NFC)":[2],"is":[3],"a":[4,146],"set":[5],"of":[6,55,64,68,174,190,206],"protocols":[8],"that":[9,125],"enable":[10],"two":[11],"electronic":[12],"devices.":[13],"Its":[14],"security":[15,54,66,197,205],"and":[16,27,37,42,44,92,101,117,129,144,160,164,188],"reliability":[17],"are":[18,47],"welcomed":[19],"by":[20],"mobile":[21],"terminal":[22],"manufactures,":[23],"banks,":[24],"telecom":[25],"operators,":[26],"third-party":[28],"payment":[29],"platforms.":[30],"Simultaneously,":[31],"it":[32],"has":[33],"also":[34],"drawn":[35],"more":[36,38],"attention":[39],"from":[40],"hackers":[41],"attackers,":[43],"NFC-enabled":[45],"devices":[46],"facing":[48],"increasing":[49],"threats.":[50],"To":[51],"improve":[52,130],"the":[53,56,59,62,74,81,103,131,185,200,204],"NFC":[57,69,151,157,175,191],"technology,":[58],"paper":[60],"studied":[61],"technology":[63],"discovering":[65,142],"vulnerabilities":[67,124,173,178],"Data":[70],"Exchange":[71],"Format":[72],"(NDEF),":[73],"most":[75],"important":[76],"data":[77],"transmission":[78],"protocol.":[79,105],"In":[80],"paper,":[82],"we":[83,137,167,194],"proposed":[84],"an":[85,139],"algorithm,":[86],"GTCT":[87,106],"(General":[88,150],"Test":[89],"Case":[90],"Construction":[91],"Test),":[93],"based":[94],"on":[95,135,162],"fuzzing":[96,126],"to":[97,110,202],"construct":[98,111],"test":[99,102,112],"cases":[100],"NDEF":[104,140],"adopts":[107],"four":[108],"strategies":[109],"cases,":[113],"manual,":[114],"generation,":[115],"mutation,":[116],"\u201creverse":[118],"analysis,\u201d":[119],"which":[120],"can":[121],"detect":[122],"logic":[123,177],"cannot":[127],"find":[128],"detection":[132],"rate.":[133],"Based":[134],"GTCT,":[136],"designed":[138],"vulnerability":[141],"framework":[143],"developed":[145],"tool":[147],"named":[148],"\u201cGNFCVulFinder\u201d":[149],"Vulnerability":[152],"Finder).":[153],"By":[154],"testing":[155],"33":[156],"system":[158],"services":[159],"applications":[161],"Android":[163],"Windows":[165],"Phones,":[166],"found":[168],"eight":[169],"vulnerabilities,":[170],"including":[171],"DoS":[172,189],"service,":[176],"about":[179,184],"opening":[180],"Bluetooth/Wi-Fi/torch,":[181],"design":[182],"flaws":[183],"black":[186],"screen,":[187],"applications.":[192],"Finally,":[193],"give":[195],"some":[196],"suggestions":[198],"for":[199],"developer":[201],"enhance":[203],"NFC.":[207]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
