Instructions unclear: Undefined behaviour in cellular network specifications
Cellular networks are a cornerstone of modern communication and indispensable to our
daily lives. Their specifications span thousands of pages, written primarily in natural …
daily lives. Their specifications span thousands of pages, written primarily in natural …
Wild networks: Exposure of 5G network infrastructures to adversarial examples
G Apruzzese, R Vladimirov… - … on Network and …, 2022 - ieeexplore.ieee.org
Fifth Generation (5G) networks must support billions of heterogeneous devices while
guaranteeing optimal Quality of Service (QoS). Such requirements are impossible to meet …
guaranteeing optimal Quality of Service (QoS). Such requirements are impossible to meet …
LTESniffer: An open-source LTE downlink/uplink eavesdropper
LTE sniffers are important for security and performance analysis because they can passively
capture the wireless traffic of users in LTE network. However, existing open-source LTE …
capture the wireless traffic of users in LTE network. However, existing open-source LTE …
Enabling Physical Localization of Uncooperative Cellular Devices
In cellular networks, authorities may need to physically locate user devices to track criminals
or illegal equipment. This process involves authorized agents tracing devices by monitoring …
or illegal equipment. This process involves authorized agents tracing devices by monitoring …
Online schedule randomization to mitigate timing attacks in 5G periodic URLLC communications
A Samaddar, A Easwaran - ACM Transactions on Sensor Networks, 2023 - dl.acm.org
Ultra-reliable low-latency communication (URLLC) in 5G networks is designed to support
time-critical applications such as industrial control systems (ICSs), where user equipment …
time-critical applications such as industrial control systems (ICSs), where user equipment …
Freaky Leaky {SMS}: Extracting User Locations by Analyzing {SMS} Timings
Short Message Service (SMS) remains one of the most popular communication channels
since its introduction in 2G cellular networks. In this paper, we demonstrate that merely …
since its introduction in 2G cellular networks. In this paper, we demonstrate that merely …
A Systematic Deconstruction of Human-Centric Privacy & Security Threats on Mobile Phones
Mobile phones are most likely the subject of targeted attacks, such as software exploits. The
resources needed to carry out such attacks are becoming increasingly available and, hence …
resources needed to carry out such attacks are becoming increasingly available and, hence …
Invade the Walled Garden: Evaluating GTP Security in Cellular Networks
Cellular backhaul and core networks have traditionally been considered as Walled Garden,
with their security ensured by physical isolation. Therefore, prior security studies primarily …
with their security ensured by physical isolation. Therefore, prior security studies primarily …
Amplifying Threats: The Role of {Multi-Sender} Coordination in {SMS-Timing-Based} Location Inference Attacks
SMS-timing-based location inference attacks leverage timing side channels to ascertain a
target's location. Prior work has primarily relied on a single-sender approach, employing …
target's location. Prior work has primarily relied on a single-sender approach, employing …
From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem
Despite the numerous pompous statements regarding 5G, it is indisputable that 5G creates a
radical shift in telecommunications. The main reason is that 5G is an enabler of numerous …
radical shift in telecommunications. The main reason is that 5G is an enabler of numerous …