Three years later: A study of mac address randomization in mobile devices and when it succeeds

E Fenske, D Brown, J Martin, T Mayberry… - Proceedings on …, 2021 - petsymposium.org
Mobile device manufacturers and operating system developers increasingly deploy MAC
address randomization to protect user privacy and prevent adversaries from tracking …

Transparent AAA security design for low-latency MEC-integrated cellular networks

CY Li, YD Lin, YC Lai, HT Chien… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Multi-access edge computing (MEC) is a key enabler for low-latency services in the cellular
network. It enables service requests to be served at the edge without reaching the Internet …

Vwanalyzer: A systematic security analysis framework for the voice over wifi protocol

H Lee, I Karim, N Li, E Bertino - Proceedings of the 2022 ACM on Asia …, 2022 - dl.acm.org
In this paper, we evaluate the security of the Voice over WiFi (VoWiFi) protocol by proposing
the VWAnalyzer framework. We model five critical procedures of the VoWiFi protocol and …

Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure

YH Lu, CY Li, YY Li, SHY Hsiao, T **e, GH Tu… - Proceedings of the 26th …, 2020 - dl.acm.org
IMS (IP Multimedia Subsystem) is an essential framework for providing 4G/5G multimedia
services. It has been deployed worldwide to support two call services: VoLTE (Voice over …

Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures

YH Lu, SHY Hsiao, CY Li, YC Hsieh… - IEEE/ACM …, 2022 - ieeexplore.ieee.org
IMS (IP Multimedia Subsystem) is an essential 4G/5G component to offer multimedia
services. It is used worldwide to support two call services: VoLTE (Voice over LTE) and …

Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer

J Baek, PKD Soundrapandian, S Kyung… - 2023 53rd Annual …, 2023 - ieeexplore.ieee.org
We investigate the feasibility of targeted privacy attacks using only information available in
physical channels of LTE mobile networks and propose three privacy attacks to demonstrate …

IMS is Not That Secure on Your 5G/4G Phones

J Shi, S Wang, MY Chen, GH Tu, T **e… - Proceedings of the 30th …, 2024 - dl.acm.org
IMS (IP Multimedia Subsystem) is vital for delivering IP-based multimedia services in mobile
networks. Despite constant upgrades by 3GPP over the past two decades to support …

Privacy attack on IoT: a systematic literature review

LM Zagi, B Aziz - 2020 International Conference on ICT for …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a technology that is a daily necessity for humans. Unfortunately, so
far, the IoT still disables privacy for various reasons. This circumstance has intrigued many …

VoWi‐Fi security threats: Address resolution protocol attack and countermeasures

KC Lu, IH Liu, KH Chang, JS Li - IET Networks, 2024 - Wiley Online Library
Abstract B5G/6G networks are facing challenges in the deployment of additional base
stations. However, Taiwan's four major operators have launched VoWi‐Fi calling services to …

Security Aspects and Vulnerabilities in Authentication Process WiFi Calling–RF measurements

C Capota, S Halunga, O Fratu, S Eugen… - … Sea Conference on …, 2021 - ieeexplore.ieee.org
The rapid development of the telecommunication standards, which are getting close to the
implementation of the 5th generation now (5G) leads to us to discover new ways to provide …