Space odyssey: An experimental software security analysis of satellites
Satellites are an essential aspect of our modern society and have contributed significantly to
the way we live today, most notable through modern telecommunications, global positioning …
the way we live today, most notable through modern telecommunications, global positioning …
5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol
The paper proposes 5GReasoner, a framework for property-guided formal verification of
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …
[PDF][PDF] IMP4GT: IMPersonation Attacks in 4G NeTworks.
Long Term Evolution (LTE/4G) establishes mutual authentication with a provably secure
Authentication and Key Agreement (AKA) protocol on layer three of the network stack …
Authentication and Key Agreement (AKA) protocol on layer three of the network stack …
5G SUCI-Catchers: Still catching them all?
In mobile networks, IMSI-Catchers identify and track users simply by requesting all users'
permanent identities (IMSI) in range. The 5G standard attempts to fix this issue by encrypting …
permanent identities (IMSI) in range. The 5G standard attempts to fix this issue by encrypting …
Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers
C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …
Bookworm game: Automatic discovery of lte vulnerabilities through documentation analysis
In the past decade, the security of cellular networks has been increasingly under scrutiny,
leading to the discovery of numerous vulnerabilities that expose the network and its users to …
leading to the discovery of numerous vulnerabilities that expose the network and its users to …
Instructions unclear: Undefined behaviour in cellular network specifications
Cellular networks are a cornerstone of modern communication and indispensable to our
daily lives. Their specifications span thousands of pages, written primarily in natural …
daily lives. Their specifications span thousands of pages, written primarily in natural …
Noncompliance as deviant behavior: An automated black-box noncompliance checker for 4g lte cellular devices
The paper focuses on develo** an automated black-box testing approach called DIKEUE
that checks 4G Long Term Evolution (LTE) control-plane protocol implementations in …
that checks 4G Long Term Evolution (LTE) control-plane protocol implementations in …
Call me maybe: Eavesdrop** encrypted {LTE} calls with {ReVoLTE}
Voice over LTE (VoLTE) is a packet-based telephony service seamlessly integrated into the
Long Term Evolution (LTE) standard and deployed by most telecommunication providers in …
Long Term Evolution (LTE) standard and deployed by most telecommunication providers in …
Is 5G handover secure and private? A survey
The next-generation mobile cellular communication and networking system (5G) is highly
flexible and heterogeneous. It integrates different types of networks, such as 4G legacy …
flexible and heterogeneous. It integrates different types of networks, such as 4G legacy …