Pay as You Want: Bypassing Charging System in Operational Cellular Networks
暂无分享,去创建一个
Hyunwoo Choi | Hyunwook Hong | Yongdae Kim | Eunkyu Lee | Dongkwan Kim | Byeongdo Hong | Hongil Kim | Yongdae Kim | Eunkyu Lee | Hyunwoo Choi | Hyunwook Hong | Dongkwan Kim | Hongil Kim | B. Hong
[1] Robert T. Braden,et al. Requirements for Internet Hosts - Communication Layers , 1989, RFC.
[2] Matt Holdrege,et al. IP Network Address Translator (NAT) Terminology and Considerations , 1999, RFC.
[3] Yuchung Cheng,et al. TCP fast open , 2011, CoNEXT '11.
[4] Songwu Lu,et al. Mobile data charging: new attacks and countermeasures , 2012, CCS.
[5] Eunyoung Jeong,et al. Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission , 2014, NDSS.
[6] A. Elnashar. 1 LTE Network Architecture and Protocols , 2014 .
[7] Songwu Lu,et al. Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging , 2014, CCS.
[8] Yuchung Cheng,et al. RFC 7413 - TCP Fast Open , 2014 .
[9] Xinbing Wang,et al. Insecurity of Voice Solution VoLTE in LTE Mobile Networks , 2015, CCS.
[10] Yongdae Kim,et al. Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations , 2015, CCS.
[11] Aaron Smith,et al. U.S. Smartphone Use in 2015 , 2015 .