On security research towards future mobile network generations

D Rupprecht, A Dabrowski, T Holz… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …

[HTML][HTML] A technical review of wireless security for the internet of things: Software defined radio perspective

JJR Uribe, EP Guillen, LS Cardoso - … of King Saud University-Computer and …, 2022 - Elsevier
The increase of cyberattacks by using the Internet of Things devices has exposed multiple
vulnerabilities not only on devices but also on IoT infrastructures. Now, small devices can …

Breaking LTE on layer two

D Rupprecht, K Kohls, T Holz… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
Long Term Evolution (LTE) is the latest mobile communication standard and has a pivotal
role in our information society: LTE combines performance goals with modern security …

5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol

SR Hussain, M Echeverria, I Karim… - Proceedings of the …, 2019 - dl.acm.org
The paper proposes 5GReasoner, a framework for property-guided formal verification of
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …

[PDF][PDF] IMP4GT: IMPersonation Attacks in 4G NeTworks.

D Rupprecht, K Kohls, T Holz, C Pöpper - NDSS, 2020 - ndss-symposium.org
Long Term Evolution (LTE/4G) establishes mutual authentication with a provably secure
Authentication and Key Agreement (AKA) protocol on layer three of the network stack …

5G SUCI-Catchers: Still catching them all?

M Chlosta, D Rupprecht, C Pöpper, T Holz - Proceedings of the 14th …, 2021 - dl.acm.org
In mobile networks, IMSI-Catchers identify and track users simply by requesting all users'
permanent identities (IMSI) in range. The 5G standard attempts to fix this issue by encrypting …

Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers

C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …

Bookworm game: Automatic discovery of lte vulnerabilities through documentation analysis

Y Chen, Y Yao, XF Wang, D Xu, C Yue… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
In the past decade, the security of cellular networks has been increasingly under scrutiny,
leading to the discovery of numerous vulnerabilities that expose the network and its users to …

Hiding in plain signal: Physical signal overshadowing attack on {LTE}

H Yang, S Bae, M Son, H Kim, SM Kim… - 28th USENIX Security …, 2019 - usenix.org
Long-Term Evolution (LTE) communication is based on an open medium; thus, a legitimate
signal can potentially be counterfeited by a malicious signal. Although most LTE signaling …

Call me maybe: Eavesdrop** encrypted {LTE} calls with {ReVoLTE}

D Rupprecht, K Kohls, T Holz, C Pöpper - 29th USENIX security …, 2020 - usenix.org
Voice over LTE (VoLTE) is a packet-based telephony service seamlessly integrated into the
Long Term Evolution (LTE) standard and deployed by most telecommunication providers in …