Security Testing of GSM Implementations
暂无分享,去创建一个
Brinio Hond | Fabian van den Broek | Arturo Cedillo Torres | Brinio Hond | F. V. D. Broek | A. C. Torres
[1] Ronny Wichers Schreur,et al. Femtocell Security in Theory and Practice , 2013, NordSec.
[2] Ralf-Philipp Weinmann,et al. Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks , 2012, WOOT.
[3] A Arturo Cedillo Torres. GSM Cell Broadcast Service security analysis , 2013 .
[4] Aboul Ella Hassanien,et al. Progress in Cryptology – AFRICACRYPT 2013 , 2013, Lecture Notes in Computer Science.
[5] Michael Ganley,et al. Encryption algorithms , 1992 .
[6] Transcoding Functions,et al. Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; , 2009 .
[7] Charlie Miller,et al. Injecting SMS messages into smart phones for security analysis , 2009 .
[8] Karsten Nohl. Attacking phone privacy , 2010 .
[9] Jean-Pierre Seifert,et al. SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale , 2011, USENIX Security Symposium.
[10] Giovanni Vigna,et al. Vulnerability Analysis of MMS User Agents , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[11] Glenford J. Myers,et al. Art of Software Testing , 1979 .
[12] Erik Poll,et al. A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers , 2013, AFRICACRYPT.