Abstract
This research paper examines AT command fuzzing techniques for mobile device security testing, analyzing vulnerabilities, exploitation methods, and security recommendations for device manufacturers. The study provides practical fuzzing methodologies.
Document
AT Commands
Fuzzing Techniques
Mobile Security
Device Testing
Security Recommendations
Command Injection
Device Vulnerabilities
Related Videos

AT Command Fuzzing Techniques
Advanced fuzzing techniques for mobile device security testing

Mobile Device Security Testing
Comprehensive security testing for mobile devices
APN Security Analysis
Access Point Names (APNs)Security analysis of APN configurations and vulnerabilities
SIM Card Security Analysis
SIM Cards & UICC SecurityComprehensive analysis of SIM card vulnerabilities
Document Information
- Type: Research Paper
- Date: 2024-01-25
- Source: Security Research
- Category: AT Commands
- File: ATFuzzer_3416125.pdf
Dr. Carlos Rodriguez
Mobile Security Labs
Device Security ResearcherDr. Lisa Thompson
USENIX Security
Fuzzing ExpertProf. Sarah Chen
Stanford University
Mobile Security