Defeating the Downgrade Attack on Identity Privacy in 5G

Author:

Khan Mohsin,Ginzboorg Philip,Järvinen Kimmo,Niemi Valtteri

Publisher

Springer International Publishing

Reference33 articles.

1. Soltani, A., Timberg, C.: Tech firm tries to pull back curtain on surveillance efforts in Washington, September 2014. https://www.washingtonpost.com/world/national-security/researchers-try-to-pull-back-curtain-on-surveillance-efforts-in-washington/2014/09/17/f8c1f590-3e81-11e4-b03f-de718edeb92f_story.html?utm_term=.96e31aa4440b . Accessed 14 July 2017

2. PKI Electronic Intelligence: 3G UMTS IMSI Catcher. http://www.pki-electronic.com/products/interception-and-monitoring-systems/3g-umts-imsi-catcher/ . Accessed 6 July 2018

3. Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., Weippl, E.: IMSI-catch me if you can: IMSI-catcher-catchers. In: Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, pp. 246–255. ACM, New York (2014)

4. Ney, P., Smith, J., Gabriel, C., Tadayoshi, K.: SeaGlass: enabling city-wide IMSI-catcher detection. In: Proceedings on Privacy Enhancing Technologies. PoPETs (2017)

5. 3GPP: TS 22.261 Service requirements for next generation new services and markets (2018). https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3107

Cited by 17 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Dependency-Graph Enabled Formal Analysis for 5G AKA Protocols: Assumption Propagation and Verification;ICC 2024 - IEEE International Conference on Communications;2024-06-09

2. Formal-Guided Fuzz Testing: Targeting Security Assurance From Specification to Implementation for 5G and Beyond;IEEE Access;2024

3. A Contextual Integrity Property to Impede Privacy Violations in 5G Networks;IFIP Advances in Information and Communication Technology;2023-12-29

4. EDR-AKA: An Enhanced Authentication Protocol to Protect 5G Against Active Sniffing Attacks;2023 29th International Conference on Telecommunications (ICT);2023-11-08

5. When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities;2023 IEEE Conference on Communications and Network Security (CNS);2023-10-02

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3