5G Mobile Networks Security Landscape and Major Risks

[1]  Jani Suomalainen,et al.  Machine Learning Threatens 5G Security , 2020, IEEE Access.

[2]  Eman Hammad,et al.  5G Security Challenges and Opportunities: A System Approach , 2020, 2020 IEEE 3rd 5G World Forum (5GWF).

[3]  Junaid Qadir,et al.  Black-box Adversarial Machine Learning Attack on Network Traffic Classification , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).

[4]  Junaid Qadir,et al.  The Adversarial Machine Learning Conundrum: Can the Insecurity of ML Become the Achilles' Heel of Cognitive Networks? , 2019, IEEE Network.

[5]  Chris Hankin,et al.  Adversarial Machine Learning Beyond the Image Domain , 2019, DAC.

[6]  Siddique Latif,et al.  Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).

[7]  Junaid Qadir,et al.  Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and the Way Forward , 2019, IEEE Communications Surveys & Tutorials.

[8]  Byrav Ramamurthy,et al.  Towards Measuring Quality of Service in Untrusted Multi-Vendor Service Function Chains: Balancing Security and Resource Consumption , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[9]  Thorsten Holz,et al.  Breaking LTE on Layer Two , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[10]  Nils Ole Tippenhauer,et al.  Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android , 2019, NDSS.

[11]  Binh Nguyen,et al.  ECHO: A Reliable Distributed Cellular Core Network for Hyper-scale Public Clouds , 2018, MobiCom.

[12]  Adam Doupé,et al.  AIM-SDN: Attacking Information Mismanagement in SDN-datastores , 2018, CCS.

[13]  Lei Xu,et al.  Towards Fine-grained Network Security Forensics and Diagnosis in the SDN Era , 2018, CCS.

[14]  Daniel L. Marino,et al.  An Adversarial Approach for Explainable AI in Intrusion Detection Systems , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.

[15]  Vuk Marojevic,et al.  Security and Protocol Exploit Analysis of the 5G Specifications , 2018, IEEE Access.

[16]  Gregory Blanc,et al.  Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service , 2018, ARES.

[17]  Ralf Sasse,et al.  A Formal Analysis of 5G Authentication , 2018, CCS.

[18]  Felix Klaedtke,et al.  A Security Architecture for 5G Networks , 2018, IEEE Access.

[19]  M. Ylianttila,et al.  Overview of 5G Security Challenges and Solutions , 2018, IEEE Communications Standards Magazine.

[20]  Prateek Mittal,et al.  DARTS: Deceiving Autonomous Cars with Toxic Signs , 2018, ArXiv.

[21]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[22]  Fabio Roli,et al.  Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning , 2017, Pattern Recognit..

[23]  Jordi Pérez-Romero,et al.  Technology pillars in the architecture of future 5G mobile networks: NFV, MEC and SDN , 2017, Comput. Stand. Interfaces.

[24]  Edgar Weippl,et al.  On Security Research Towards Future Mobile Network Generations , 2017, IEEE Communications Surveys & Tutorials.

[25]  Tanesh Kumar,et al.  5G security: Analysis of threats and solutions , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

[26]  Antonios Argyriou,et al.  Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes , 2017, J. Netw. Comput. Appl..

[27]  Raimo Kantola,et al.  Enhancing Security of Software Defined Mobile Networks , 2017, IEEE Access.

[28]  Ayman I. Kayssi,et al.  Multi-level security for the 5G/IoT ubiquitous network , 2017, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC).

[29]  Mahesh K. Marina,et al.  FlexRAN: A Flexible and Programmable Platform for Software-Defined Radio Access Networks , 2016, CoNEXT.

[30]  Min Chen,et al.  Software-Defined Mobile Networks Security , 2016, Mobile Networks and Applications.

[31]  Andrei V. Gurtov,et al.  Opportunities and Challenges of Software-Defined Mobile Networks in Network Security , 2016, IEEE Security & Privacy.

[32]  Kartik Palani,et al.  Invisible and forgotten: Zero-day blooms in the IoT , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[33]  Sakir Sezer,et al.  A Survey of Security in Software Defined Networks , 2016, IEEE Communications Surveys & Tutorials.

[34]  Mohsen Guizani,et al.  Securing software defined wireless networks , 2016, IEEE Communications Magazine.

[35]  Valtteri Niemi,et al.  Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems , 2015, NDSS.

[36]  Raimo Kantola,et al.  Security for Future Software Defined Mobile Networks , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.

[37]  Tuomas Aura,et al.  Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[38]  Ejaz Ahmed,et al.  Securing software defined networks: taxonomy, requirements, and open issues , 2015, IEEE Communications Magazine.

[39]  Sakir Sezer,et al.  Queen ' s University Belfast-Research Portal Are We Ready for SDN ? Implementation Challenges for Software-Defined Networks , 2016 .

[40]  Roger Piqueras Jover,et al.  Security attacks against the availability of LTE mobility networks: Overview and research directions , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).

[41]  Mark Ryan,et al.  New privacy issues in mobile telephony: fix and verification , 2012, CCS.

[42]  Brighten Godfrey,et al.  VeriFlow: verifying network-wide invariants in real time , 2012, HotSDN '12.

[43]  Blaine Nelson,et al.  Can machine learning be secure? , 2006, ASIACCS '06.

[44]  Patrick D. McDaniel,et al.  IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT , 2019, NDSS.

[45]  Elisa Bertino,et al.  Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information , 2019, NDSS.

[46]  Dave Levin,et al.  Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet , 2019, NDSS.

[47]  Robert H. Deng,et al.  Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment , 2019, NDSS.

[48]  Zhiqiang Lin,et al.  IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing , 2018, NDSS.

[49]  Kay Römer,et al.  Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud , 2017, NDSS.