An Analysis of DoS Attack Strategies Against the LTE RAN
暂无分享,去创建一个
Gabriel Salles-Loustau | Saman Zonouz | Jill Jermyn | S. Zonouz | Gabriel Salles-Loustau | Jill Jermyn
[1] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.
[2] Giovanni Vigna,et al. Vulnerability Analysis of MMS User Agents , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[3] Cliff Changchun Zou,et al. Denial of convenience attack to smartphones using a fake Wi-Fi access point , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).
[4] Giovanni Chiola,et al. Slow DoS attacks: definition and categorisation , 2013, Int. J. Trust. Manag. Comput. Commun..
[5] Xiapu Luo,et al. Recursive DNS Architectures and Vulnerability Implications , 2009, NDSS.
[6] Jean-Pierre Seifert,et al. Rise of the iBots: Owning a telco network , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[7] Thomas F. La Porta,et al. Exploiting open functionality in SMS-capable cellular networks , 2008, J. Comput. Secur..
[8] Thomas F. La Porta,et al. On cellular botnets: measuring the impact of malicious devices on a cellular network core , 2009, CCS.
[9] Lusheng Ji,et al. A first look at cellular machine-to-machine traffic: large scale measurement and characterization , 2012, SIGMETRICS '12.
[10] Stefania Sesia,et al. LTE - The UMTS Long Term Evolution, Second Edition , 2011 .
[11] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[12] Dongho Won,et al. A Practical Analysis of Smartphone Security , 2011, HCI.
[13] Fabio Ricciato,et al. A review of DoS attack models for 3G cellular networks from a system-design perspective , 2010, Comput. Commun..
[14] Nicola Gobbo,et al. A Denial of Service Attack to GSM Networks via Attach Procedure , 2013, CD-ARES Workshops.
[15] J. Seifert,et al. Rise of the iBots : 0 wning a telco network , 2010 .
[16] Patrick D. McDaniel,et al. On Attack Causality in Internet-Connected Cellular Networks , 2007, USENIX Security Symposium.
[17] Srdjan Capkun,et al. Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems , 2010 .
[18] Imad H. Elhajj,et al. A resource reservation attack against LTE networks , 2013, 2013 Third International Conference on Communications and Information Technology (ICCIT).
[19] Hao Chen,et al. Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks , 2010, IEEE Transactions on Mobile Computing.
[20] Vinod Yegneswaran,et al. An Analysis of the iKee.B iPhone Botnet , 2010, MobiSec.
[21] Lixia Zhang,et al. Understanding Resiliency of Internet Topology against Prefix Hijack Attacks , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[22] Masood Khosroshahy,et al. Botnets in 4G cellular networks: Platforms to launch DDoS attacks against the air interface , 2013, 2013 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT).
[23] Dimitris Gritzalis,et al. Smartphone security evaluation The malware attack case , 2011, Proceedings of the International Conference on Security and Cryptography.
[24] Peng Liu,et al. CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks , 2006, SEC.