Three years later: A study of mac address randomization in mobile devices and when it succeeds
Mobile device manufacturers and operating system developers increasingly deploy MAC
address randomization to protect user privacy and prevent adversaries from tracking …
address randomization to protect user privacy and prevent adversaries from tracking …
Transparent AAA security design for low-latency MEC-integrated cellular networks
Multi-access edge computing (MEC) is a key enabler for low-latency services in the cellular
network. It enables service requests to be served at the edge without reaching the Internet …
network. It enables service requests to be served at the edge without reaching the Internet …
Vwanalyzer: A systematic security analysis framework for the voice over wifi protocol
In this paper, we evaluate the security of the Voice over WiFi (VoWiFi) protocol by proposing
the VWAnalyzer framework. We model five critical procedures of the VoWiFi protocol and …
the VWAnalyzer framework. We model five critical procedures of the VoWiFi protocol and …
Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure
IMS (IP Multimedia Subsystem) is an essential framework for providing 4G/5G multimedia
services. It has been deployed worldwide to support two call services: VoLTE (Voice over …
services. It has been deployed worldwide to support two call services: VoLTE (Voice over …
Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures
YH Lu, SHY Hsiao, CY Li, YC Hsieh… - IEEE/ACM …, 2022 - ieeexplore.ieee.org
IMS (IP Multimedia Subsystem) is an essential 4G/5G component to offer multimedia
services. It is used worldwide to support two call services: VoLTE (Voice over LTE) and …
services. It is used worldwide to support two call services: VoLTE (Voice over LTE) and …
Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer
We investigate the feasibility of targeted privacy attacks using only information available in
physical channels of LTE mobile networks and propose three privacy attacks to demonstrate …
physical channels of LTE mobile networks and propose three privacy attacks to demonstrate …
IMS is Not That Secure on Your 5G/4G Phones
IMS (IP Multimedia Subsystem) is vital for delivering IP-based multimedia services in mobile
networks. Despite constant upgrades by 3GPP over the past two decades to support …
networks. Despite constant upgrades by 3GPP over the past two decades to support …
Privacy attack on IoT: a systematic literature review
Internet of Things (IoT) is a technology that is a daily necessity for humans. Unfortunately, so
far, the IoT still disables privacy for various reasons. This circumstance has intrigued many …
far, the IoT still disables privacy for various reasons. This circumstance has intrigued many …
VoWi‐Fi security threats: Address resolution protocol attack and countermeasures
KC Lu, IH Liu, KH Chang, JS Li - IET Networks, 2024 - Wiley Online Library
Abstract B5G/6G networks are facing challenges in the deployment of additional base
stations. However, Taiwan's four major operators have launched VoWi‐Fi calling services to …
stations. However, Taiwan's four major operators have launched VoWi‐Fi calling services to …
Security Aspects and Vulnerabilities in Authentication Process WiFi Calling–RF measurements
The rapid development of the telecommunication standards, which are getting close to the
implementation of the 5th generation now (5G) leads to us to discover new ways to provide …
implementation of the 5th generation now (5G) leads to us to discover new ways to provide …