New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities
暂无分享,去创建一个
Jean-Pierre Seifert | Ravishankar Borgaonkar | Shinjo Park | Altaf Shaik | J. Seifert | Shinjo Park | Altaf Shaik | Ravishankar Borgaonkar | Jean-Pierre Seifert
[1] MuYi,et al. Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure , 2018 .
[2] Keijo Haataja,et al. Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures , 2010, IEEE Transactions on Wireless Communications.
[3] Thorsten Holz,et al. Breaking LTE on Layer Two , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[4] Ahmad-Reza Sadeghi,et al. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[5] Yi Mu,et al. Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure , 2018, Personal and Ubiquitous Computing.
[6] Valtteri Niemi,et al. Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems , 2015, NDSS.
[7] Jean-Pierre Seifert,et al. On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks , 2018, WISEC.
[8] Ravishankar Borgaonkar,et al. Mobile Subscriber WiFi Privacy , 2017, 2017 IEEE Security and Privacy Workshops (SPW).
[9] K. Hypponen,et al. Man-In-The-Middle attacks on bluetooth: a comparative analysis, a novel attack, and countermeasures , 2008, 2008 3rd International Symposium on Communications, Control and Signal Processing.