Instructions unclear: Undefined behaviour in cellular network specifications

D Klischies, M Schloegel, T Scharnowski… - 32nd USENIX Security …, 2023 - usenix.org
Cellular networks are a cornerstone of modern communication and indispensable to our
daily lives. Their specifications span thousands of pages, written primarily in natural …

Wild networks: Exposure of 5G network infrastructures to adversarial examples

G Apruzzese, R Vladimirov… - … on Network and …, 2022 - ieeexplore.ieee.org
Fifth Generation (5G) networks must support billions of heterogeneous devices while
guaranteeing optimal Quality of Service (QoS). Such requirements are impossible to meet …

LTESniffer: An open-source LTE downlink/uplink eavesdropper

TD Hoang, CJ Park, M Son, T Oh, S Bae, J Ahn… - Proceedings of the 16th …, 2023 - dl.acm.org
LTE sniffers are important for security and performance analysis because they can passively
capture the wireless traffic of users in LTE network. However, existing open-source LTE …

Enabling Physical Localization of Uncooperative Cellular Devices

T Oh, S Bae, J Ahn, Y Lee, TD Hoang… - Proceedings of the 30th …, 2024 - dl.acm.org
In cellular networks, authorities may need to physically locate user devices to track criminals
or illegal equipment. This process involves authorized agents tracing devices by monitoring …

Online schedule randomization to mitigate timing attacks in 5G periodic URLLC communications

A Samaddar, A Easwaran - ACM Transactions on Sensor Networks, 2023 - dl.acm.org
Ultra-reliable low-latency communication (URLLC) in 5G networks is designed to support
time-critical applications such as industrial control systems (ICSs), where user equipment …

Freaky Leaky {SMS}: Extracting User Locations by Analyzing {SMS} Timings

E Bitsikas, T Schnitzler, C Pöpper… - 32nd USENIX Security …, 2023 - usenix.org
Short Message Service (SMS) remains one of the most popular communication channels
since its introduction in 2G cellular networks. In this paper, we demonstrate that merely …

A Systematic Deconstruction of Human-Centric Privacy & Security Threats on Mobile Phones

H Farzand, M Abraham, S Brewster… - … Journal of Human …, 2024 - Taylor & Francis
Mobile phones are most likely the subject of targeted attacks, such as software exploits. The
resources needed to carry out such attacks are becoming increasingly available and, hence …

Invade the Walled Garden: Evaluating GTP Security in Cellular Networks

Y Zhang, T Wan, Y Yang, H Duan, Y Wang… - 2025 IEEE Symposium …, 2024 - computer.org
Cellular backhaul and core networks have traditionally been considered as Walled Garden,
with their security ensured by physical isolation. Therefore, prior security studies primarily …

Amplifying Threats: The Role of {Multi-Sender} Coordination in {SMS-Timing-Based} Location Inference Attacks

E Bitsikas, T Schnitzler, C Pöpper… - 18th USENIX WOOT …, 2024 - usenix.org
SMS-timing-based location inference attacks leverage timing side channels to ascertain a
target's location. Prior work has primarily relied on a single-sender approach, employing …

From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem

A Michalas, C Patsakis, DD Vergados… - arxiv preprint arxiv …, 2022 - arxiv.org
Despite the numerous pompous statements regarding 5G, it is indisputable that 5G creates a
radical shift in telecommunications. The main reason is that 5G is an enabler of numerous …