[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3564625.3568000acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

You have been warned: Abusing 5G’s Warning and Emergency Systems

Published: 05 December 2022 Publication History

Abstract

The Public Warning System (PWS) is an essential part of cellular networks and a country’s civil protection. Warnings can notify users of hazardous events (e. g., floods, earthquakes) and crucial national matters that require immediate attention. PWS attacks disseminating fake warnings or concealing precarious events can have a serious impact, causing fraud, panic, physical harm, or unrest to users within an affected area. In this work, we conduct the first comprehensive investigation of PWS security in 5G networks. We demonstrate five practical attacks that may impact the security of 5G-based Commercial Mobile Alert System (CMAS) as well as Earthquake and Tsunami Warning System (ETWS) alerts. Additional to identifying the vulnerabilities, we investigate two PWS spoofing and three PWS suppression attacks, with or without a man-in-the-middle (MitM) attacker. We discover that MitM-based attacks have more severe impact than their non-MitM counterparts. Our PWS barring attack is an effective technique to eliminate legitimate warning messages. We perform a rigorous analysis of the roaming aspect of the PWS, incl. its potentially secure version, and report the implications of our attacks on other emergency features (e. g., 911 SIP calls). We discuss possible countermeasures and note that eradicating the attacks necessitates a scrupulous reevaluation of the PWS design and a secure implementation.

References

[1]
3GPP. 2019. Emergency Communications (EMTEL); European Public Warning System (EU-ALERT) using the Cell Broadcast Service. Version 1.3.1.
[2]
3GPP. 2020. 5G; Security architecture and procedures for 5G System. Version 16.3.0.
[3]
3GPP. 2020. Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; 5G; Technical realization of Cell Broadcast Service (CBS). Version 16.4.0.
[4]
3GPP. 2020. Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; 5G; Technical realization of the Short Message Service (SMS). Version 16.0.0.
[5]
3GPP. 2020. Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; Remote APDU Structure for (U)SIM Toolkit applications. Version 16.0.0.
[6]
3GPP. 2020. Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; Secured packet structure for (Universal) Subscriber Identity Module (U)SIM Toolkit applications. Version 16.0.0.
[7]
3GPP. 2020. Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); Public Warning System (PWS) requirements. Version 16.4.0.
[8]
3GPP. 2020. Technical Specification Group Services and System Aspects Study on 5G Security Enhancement against False Base Stations (FBS) (Release 17). Version 0.12.1.
[9]
3GPP. 2021. 5G; NR; Medium Access Control (MAC) protocol specification. Version 16.5.0.
[10]
3GPP. 2021. 5G; NR; Radio Resource Control (RRC); Protocol specification. Version 16.3.1.
[11]
3GPP. 2021. 5G; NR; User Equipment (UE) procedures in idle mode and in RRC Inactive state. Version 16.4.0.
[12]
3GPP. 2021. 5G; Procedures for the 5G System (5GS). Version 16.8.0.
[13]
3GPP. 2021. Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; 5G; Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA). Version 16.4.0.
[14]
3GPP. 2021. Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; IP Multimedia Subsystem (IMS); Stage 2. Version 16.6.0.
[15]
3GPP. 2021. Universal Mobile Telecommunications System (UMTS); LTE; 5G; Characteristics of the Universal Subscriber Identity Module (USIM) application. Version 16.6.0.
[16]
3GPP. 2022. Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; Study on security aspects of Public Warning System (PWS). Version 17.0.0.
[17]
Amarisoft. 2020. Amarisoft Callbox Classic. "https://www.amarisoft.com/products/test-measurements/amari-lte-callbox/".
[18]
Andreea Ancuta Onofrei, Yacine Rebahi, and Thomas Magedanz. 2010. Preventing Distributed Denial-of-Service Attacks on the IMS Emergency Services Support through Adaptive Firewall Pinholing. International Journal of Next-Generation Networks 2, 1 (Mar 2010), 1–17. https://doi.org/10.5121/ijngn.2010.2101
[19]
David Basin, Jannik Dreier, Lucca Hirschi, Saša Radomirovic, Ralf Sasse, and Vincent Stettler. 2018. A Formal Analysis of 5G Authentication. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (Toronto, Canada) (CCS ’18). Association for Computing Machinery, New York, NY, USA, 1383–1396. https://doi.org/10.1145/3243734.3243846
[20]
Evangelos Bitsikas and Christina Pöpper. 2021. Don’t Hand It Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications. In Annual Computer Security Applications Conference(Virtual Event, USA) (ACSAC). Association for Computing Machinery, New York, NY, USA, 900–915. https://doi.org/10.1145/3485832.3485914
[21]
Ravishankar Borgaonkar, Lucca Hirschi, Shinjo Park, and Altaf Shaik. 2019. New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols. Proc. Priv. Enhancing Technol. 2019, 3 (2019), 108–127. https://doi.org/10.2478/popets-2019-0039
[22]
Yi Chen, Yepeng Yao, XiaoFeng Wang, Dandan Xu, Chang Yue, Xiaozhong Liu, Kai Chen, Haixu Tang, and Baoxu Liu. 2021. Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis. In 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24-27 May 2021. IEEE, 1197–1214. https://doi.org/10.1109/SP40001.2021.00104
[23]
Merlin Chlosta, David Rupprecht, Thorsten Holz, and Christina Pöpper. 2019. LTE Security Disabled: Misconfiguration in Commercial Networks. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks (Miami, Florida) (WiSec ’19). Association for Computing Machinery, New York, NY, USA, 261–266. https://doi.org/10.1145/3317549.3324927
[24]
Merlin Chlosta, David Rupprecht, Christina Pöpper, and Thorsten Holz. 2021. 5G SUCI-Catchers: Still Catching Them All?. In Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (Abu Dhabi, United Arab Emirates) (WiSec ’21). Association for Computing Machinery, New York, NY, USA, 359–364. https://doi.org/10.1145/3448300.3467826
[25]
One2Many Company. 2020. Cell Broadcast and National Public Warning. "https://www.one2many.eu/cell-broadcast-and-national-public-".
[26]
Mitziu Echeverria, Zeeshan Ahmed, Bincheng Wang, M. Fareed Arif, Syed Rafiul Hussain, and Omar Chowdhury. 2021. PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification. In The Network and Distributed System Security Symposium (NDSS). Springer.
[27]
Ettus Research. 2020. USRP B210 SDR Kit - Dual Channel Transceiver (70MHz - 6GHz). "https://www.ettus.com/all-products/ub210-kit/".
[28]
European Commission. 2021. Early Warning and Information Systems. "https://ec.europa.eu/echo/what/civil-protection/early-warning-information-systems_en".
[29]
European Emergency Number Association. 2019. Public Warning Systems-Update. "https://eena.org/wp-content/uploads/2019_03_30_PWS_Document_FINAL_Compressed.pdf".
[30]
everbridge. 2022. Public Warning. https://www.everbridge.com/products/public-warning/.
[31]
Kaiming Fang and Guanhua Yan. 2020. Paging Storm Attacks against 4G/LTE Networks from Regional Android Botnets: Rationale, Practicality, and Implications. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (Linz, Austria) (WiSec ’20). Association for Computing Machinery, New York, NY, USA, 295–305. https://doi.org/10.1145/3395351.3399347
[32]
Federal Communications Commission. 2021. Wireless emergency alerts. "https://www.fcc.gov/public-safety-and-homeland-security/policy-and-licensing-division/alerting/general/wireless".
[33]
Mordechai Guri, Yisroel Mirsky, and Yuval Elovici. 2017. 9-1-1 DDoS: Attacks, Analysis and Mitigation. 2017 IEEE European Symposium on Security and Privacy (EuroS&P) (2017), 218–232.
[34]
Abida Haque, Varun Madathil, Bradley Reaves, and Alessandra Scafuro. 2021. Anonymous Device Authorization for Cellular Networks. In Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (Abu Dhabi, United Arab Emirates) (WiSec ’21). Association for Computing Machinery, New York, NY, USA, 25–36. https://doi.org/10.1145/3448300.3468285
[35]
Chris Herhalt. 2020. Mistaken Pickering, Ont. nuclear alert sparked panic, emails show. CTV News (2020). "https://toronto.ctvnews.ca/mistaken-pickering-ont-nuclear-alert-sparked-panic-emails-show-1.5237473"
[36]
Homeland Security. 2013. Best Practices in Wireless Emergency Alerts. "https://www.dhs.gov/sites/default/files/publications/Wireless/Emergency Alerts Best Practices_0.pdf".
[37]
Kaiyu Hou, You Li, Yinbo Yu, Yan Chen, and Hai Zhou. 2021. Discovering Emergency Call Pitfalls for Cellular Networks with Formal Methods. In Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services (Virtual Event, Wisconsin) (MobiSys ’21). Association for Computing Machinery, New York, NY, USA, 296–309. https://doi.org/10.1145/3458864.3466625
[38]
Xinxin Hu, Caixia Liu, Shuxin Liu, Wei You, Yingle Li, and Yu Zhao. 2019. A Systematic Analysis Method for 5G Non-Access Stratum Signalling Security. IEEE Access 7(2019), 125424–125441.
[39]
Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, and Elisa Bertino. 2018. LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018. The Internet Society.
[40]
Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li, and Elisa Bertino. 2019. Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019. The Internet Society.
[41]
Syed Rafiul Hussain, Mitziu Echeverria, Imtiaz Karim, Omar Chowdhury, and Elisa Bertino. 2019. 5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (London, United Kingdom) (CCS ’19). Association for Computing Machinery, New York, NY, USA, 669–684. https://doi.org/10.1145/3319535.3354263
[42]
Syed Rafiul Hussain, Mitziu Echeverria, Ankush Singla, Omar Chowdhury, and Elisa Bertino. 2019. Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks(Miami, Florida) (WiSec ’19). Association for Computing Machinery, New York, NY, USA, 1–11. https://doi.org/10.1145/3317549.3323402
[43]
Hongil Kim, Dongkwan Kim, Minhee Kwon, Hyungseok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, and Yongdae Kim. 2015. Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-Implementations. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security(Denver, Colorado, USA) (CCS ’15). Association for Computing Machinery, New York, NY, USA, 328–339. https://doi.org/10.1145/2810103.2813718
[44]
Hongil Kim, Jiho Lee, Eunkyu Lee, and Yongdae Kim. 2019. Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019. IEEE, 1153–1168. https://doi.org/10.1109/SP.2019.00038
[45]
Gyuhong Lee, Jihoon Lee, Jinsung Lee, Youngbin Im, Max Hollingsworth, Eric Wustrow, Dirk Grunwald, and Sangtae Ha. 2019. This is Your President Speaking: Spoofing Alerts in 4G LTE Networks. In Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services (Seoul, Republic of Korea) (MobiSys ’19). Association for Computing Machinery, New York, NY, USA, 404–416. https://doi.org/10.1145/3307334.3326082
[46]
Jihoon Lee, Gyuhong Lee, Jinsung Lee, Youngbin Im, Max Hollingsworth, Eric Wustrow, Dirk Grunwald, and Sangtae Ha. 2021. Securing the Wireless Emergency Alerts System. Commun. ACM 64, 10 (Sept. 2021), 85–93. https://doi.org/10.1145/3481042
[47]
Z. Li, W. Wang, Christo Wilson, Jian Jhen Chen, C. Qian, T. Jung, L. Zhang, K. Liu, Xiangyang Li, and Y. Liu. 2017. FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild. In NDSS.
[48]
Norbert Ludant and Guevara Noubir. 2021. SigUnder: A Stealthy 5G Low Power Attack and Defenses. In Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (Abu Dhabi, United Arab Emirates) (WiSec ’21). Association for Computing Machinery, New York, NY, USA, 250–260. https://doi.org/10.1145/3448300.3467817
[49]
Prajwol Kumar Nakarmi, Mehmet Akif Ersoy, Elif Ustundag Soykan, and Karl Norrman. 2021. Murat: Multi-RAT False Base Station Detector. https://doi.org/10.48550/ARXIV.2102.08780
[50]
Prajwol Kumar Nakarmi, Oscar Ohlsson, and Peter Hedman. 2019. Fighting IMSI catchers: A look at 5G cellular paging privacy. Technical Report. Ericsson. https://www.ericsson.com/en/blog/2019/5/fighting-imsi-catchers-5g-cellular-paging-privacy
[51]
National Academies of Sciences, Engineering, and Medicine. 2018. Emergency Alert and Warning Systems: Current Knowledge and Future Research Directions. The National Academies Press, Washington, DC. https://doi.org/10.17226/24935
[52]
United Nations. 2022. Early Warning System. https://www.un.org/en/climatechange/climate-solutions/early-warning-systems.
[53]
World Meteorological Organization. 2022. Early Warning systems must protect everyone within five years. https://public.wmo.int/en/media/press-release/%E2%80%8Bearly-warning-systems-must-protect-everyone-within-five-years.
[54]
CheolJun Park, Sangwook Bae, BeomSeok Oh, Jiho Lee, Eunkyu Lee, Insu Yun, and Yongdae Kim. 2022. DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA.
[55]
Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Andrew Martin, and Jean-Pierre Seifert. 2017. White-Stingray: Evaluating IMSI Catchers Detection Applications. In 11th USENIX Workshop on Offensive Technologies (WOOT 17). USENIX Association, Vancouver, BC. https://www.usenix.org/conference/woot17/workshop-program/presentation/park
[56]
European parliament and council of the European Union. 2018. DIRECTIVE (EU) 2018/1972 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 11 December 2018 establishing the European Electronic Communications Code. Official Journal of the European Union(2018). "https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32018L1972&from=EN"
[57]
Hannah Ritchie and Max Roser. 2014. Natural Disasters. Our World in Data (2014). "https://ourworldindata.org/natural-disasters"
[58]
Jolyn Rosa. 2018. Ballistic missile warning sent in error by Hawaii authorities. Reuters (2018). "https://www.reuters.com/article/us-usa-missiles-falsealarm-idUSKBN1F20U1"
[59]
David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina Pöpper. 2019. Breaking LTE on Layer Two. In IEEE Symposium on Security & Privacy (SP). IEEE.
[60]
David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina Pöpper. 2020. IMP4GT: IMPersonation Attacks in 4G NeTworks. In ISOC Network and Distributed System Security Symposium (NDSS). ISOC.
[61]
Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, and Jean-Pierre Seifert. 2016. Practical attacks against privacy and availability in 4G/LTE mobile communication systems. In 23rd Annual Network and Distributed System Security Symposium (NDSS 2016). Internet Society, United States. https://doi.org/10.14722/ndss.2016.23236
[62]
Altaf Shaik, Ravishankar Borgaonkar, Shinjo Park, and Jean-Pierre Seifert. 2018. On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks. In Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks(Stockholm, Sweden) (WiSec ’18). Association for Computing Machinery, New York, NY, USA, 75–86. https://doi.org/10.1145/3212480.3212497
[63]
Altaf Shaik, Ravishankar Borgaonkar, Shinjo Park, and Jean-Pierre Seifert. 2019. New Vulnerabilities in 4G and 5G Cellular Access Network Protocols: Exposing Device Capabilities. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks (Miami, Florida) (WiSec ’19). Association for Computing Machinery, New York, NY, USA, 221–231. https://doi.org/10.1145/3317549.3319728
[64]
Ankush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila Yavuz, and Elisa Bertino. 2021. Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations. In Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security (Virtual Event, Hong Kong) (ASIA CCS ’21). Association for Computing Machinery, New York, NY, USA, 501–515. https://doi.org/10.1145/3433210.3453082
[65]
Ankush Singla, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino, and Ninghui Li. 2020. Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks. Proc. Priv. Enhancing Technol. 2020, 1 (2020), 126–142. https://doi.org/10.2478/popets-2020-0008
[66]
CNN Philippines Staff. 2021. Bongbong Marcos: Issuing ’emergency alerts’ brings no advantage to me. CNN News (2021). "https://www.cnn.ph/news/2021/10/7/Bongbong-Marcos-emergency-alert.html"
[67]
Patrick Traynor. 2012. Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services. IEEE Transactions on Mobile Computing 11, 6 (jun 2012), 983–994. https://doi.org/10.1109/TMC.2011.120
[68]
Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Yuanjie Li, and Songwu Lu. 2016. New Security Threats Caused by IMS-Based SMS Service in 4G LTE Networks. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (Vienna, Austria) (CCS ’16). Association for Computing Machinery, New York, NY, USA, 1118–1130. https://doi.org/10.1145/2976749.2978393
[69]
Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Yuanjie Li, and Songwu Lu. 2016. New Security Threats Caused by IMS-Based SMS Service in 4G LTE Networks. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (Vienna, Austria) (CCS ’16). Association for Computing Machinery, New York, NY, USA, 1118–1130. https://doi.org/10.1145/2976749.2978393
[70]
Hojoon Yang, Sangwook Bae, Mincheol Son, Hongil Kim, Song Min Kim, and Yongdae Kim. 2019. Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 55–72.

Cited By

View all
  • (2024)Fake Base Station Detection and Link Routing DefenseElectronics10.3390/electronics1317347413:17(3474)Online publication date: 1-Sep-2024
  • (2024)6G-XSec: Explainable Edge Security for Emerging OpenRAN ArchitecturesProceedings of the 23rd ACM Workshop on Hot Topics in Networks10.1145/3696348.3696881(77-85)Online publication date: 18-Nov-2024
  • (2024)Fixing Insecure Cellular System Information Broadcasts For GoodProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678924(693-708)Online publication date: 30-Sep-2024
  • Show More Cited By

Index Terms

  1. You have been warned: Abusing 5G’s Warning and Emergency Systems
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image ACM Other conferences
          ACSAC '22: Proceedings of the 38th Annual Computer Security Applications Conference
          December 2022
          1021 pages
          ISBN:9781450397599
          DOI:10.1145/3564625
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 05 December 2022

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. 5G
          2. MitM attacks
          3. Public Warning System
          4. spoofing
          5. suppression

          Qualifiers

          • Research-article
          • Research
          • Refereed limited

          Conference

          ACSAC

          Acceptance Rates

          Overall Acceptance Rate 104 of 497 submissions, 21%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)167
          • Downloads (Last 6 weeks)10
          Reflects downloads up to 14 Dec 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Fake Base Station Detection and Link Routing DefenseElectronics10.3390/electronics1317347413:17(3474)Online publication date: 1-Sep-2024
          • (2024)6G-XSec: Explainable Edge Security for Emerging OpenRAN ArchitecturesProceedings of the 23rd ACM Workshop on Hot Topics in Networks10.1145/3696348.3696881(77-85)Online publication date: 18-Nov-2024
          • (2024)Fixing Insecure Cellular System Information Broadcasts For GoodProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678924(693-708)Online publication date: 30-Sep-2024
          • (2024)Uncovering Problematic Designs Hindering Ubiquitous Cellular Emergency Services AccessProceedings of the 30th Annual International Conference on Mobile Computing and Networking10.1145/3636534.3690704(1455-1469)Online publication date: 4-Dec-2024
          • (2024)Taming the Insecurity of Cellular Emergency Services (9–1-1): From Vulnerabilities to Secure DesignsIEEE/ACM Transactions on Networking10.1109/TNET.2024.337929232:4(3076-3091)Online publication date: Aug-2024
          • (2024)NReplay: 5G Key Reinstallation Attack Based on NAS Layer VulnerabilitiesMILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM)10.1109/MILCOM61039.2024.10773741(1088-1093)Online publication date: 28-Oct-2024
          • (2024)Fake Base Station Detection and Blacklisting2024 33rd International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN61486.2024.10637542(1-9)Online publication date: 29-Jul-2024
          • (2024)Exploring the Impact of Big Data Analytics on Emergency Calls within Telecommunication SystemsProcedia Computer Science10.1016/j.procs.2024.06.021238(240-247)Online publication date: 2024
          • (2023)Freaky Leaky SMSProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620358(2151-2168)Online publication date: 9-Aug-2023
          • (2023)An Experimental Testbed for 5G Network Security AssessmentNOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium10.1109/NOMS56928.2023.10154283(1-6)Online publication date: 8-May-2023
          • Show More Cited By

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format.

          HTML Format

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media