Space odyssey: An experimental software security analysis of satellites

J Willbold, M Schloegel, M Vögele… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Satellites are an essential aspect of our modern society and have contributed significantly to
the way we live today, most notable through modern telecommunications, global positioning …

5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol

SR Hussain, M Echeverria, I Karim… - Proceedings of the …, 2019 - dl.acm.org
The paper proposes 5GReasoner, a framework for property-guided formal verification of
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …

[PDF][PDF] IMP4GT: IMPersonation Attacks in 4G NeTworks.

D Rupprecht, K Kohls, T Holz, C Pöpper - NDSS, 2020 - ndss-symposium.org
Long Term Evolution (LTE/4G) establishes mutual authentication with a provably secure
Authentication and Key Agreement (AKA) protocol on layer three of the network stack …

5G SUCI-Catchers: Still catching them all?

M Chlosta, D Rupprecht, C Pöpper, T Holz - Proceedings of the 14th …, 2021 - dl.acm.org
In mobile networks, IMSI-Catchers identify and track users simply by requesting all users'
permanent identities (IMSI) in range. The 5G standard attempts to fix this issue by encrypting …

Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers

C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …

Bookworm game: Automatic discovery of lte vulnerabilities through documentation analysis

Y Chen, Y Yao, XF Wang, D Xu, C Yue… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
In the past decade, the security of cellular networks has been increasingly under scrutiny,
leading to the discovery of numerous vulnerabilities that expose the network and its users to …

Instructions unclear: Undefined behaviour in cellular network specifications

D Klischies, M Schloegel, T Scharnowski… - 32nd USENIX Security …, 2023 - usenix.org
Cellular networks are a cornerstone of modern communication and indispensable to our
daily lives. Their specifications span thousands of pages, written primarily in natural …

Noncompliance as deviant behavior: An automated black-box noncompliance checker for 4g lte cellular devices

SR Hussain, I Karim, AA Ishtiaq, O Chowdhury… - Proceedings of the …, 2021 - dl.acm.org
The paper focuses on develo** an automated black-box testing approach called DIKEUE
that checks 4G Long Term Evolution (LTE) control-plane protocol implementations in …

Call me maybe: Eavesdrop** encrypted {LTE} calls with {ReVoLTE}

D Rupprecht, K Kohls, T Holz, C Pöpper - 29th USENIX security …, 2020 - usenix.org
Voice over LTE (VoLTE) is a packet-based telephony service seamlessly integrated into the
Long Term Evolution (LTE) standard and deployed by most telecommunication providers in …

Is 5G handover secure and private? A survey

D Zhao, Z Yan, M Wang, P Zhang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The next-generation mobile cellular communication and networking system (5G) is highly
flexible and heterogeneous. It integrates different types of networks, such as 4G legacy …