Discovering Network Control Vulnerabilities and Policies in Evolving Networks

Discovering Network Control Vulnerabilities and Policies in Evolving Networks

[1]  Stefania Sesia,et al.  LTE - The UMTS Long Term Evolution, Second Edition , 2011 .

[2]  Richard Clayton,et al.  Failures in a Hybrid Content Blocking System , 2005, Privacy Enhancing Technologies.

[3]  Stefan Lindskog,et al.  How the Great Firewall of China is Blocking Tor , 2012, FOCI.

[4]  Jeffrey Knockel,et al.  Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance , 2011, FOCI.

[5]  Ayman I. Kayssi,et al.  Signaling oriented denial of service on LTE networks , 2012, MobiWac '12.

[6]  Minaxi Gupta,et al.  Inferring Mechanics of Web Censorship Around the World , 2012, FOCI.

[7]  Yasir Zaki,et al.  Influence of future M2M communication on the LTE system , 2013, 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC).

[8]  Vern Paxson,et al.  SoK: Towards Grounding Censorship Circumvention in Empiricism , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[9]  Thomas F. La Porta,et al.  On cellular botnets: measuring the impact of malicious devices on a cellular network core , 2009, CCS.

[10]  Nick Feamster,et al.  Examining How the Great Firewall Discovers Hidden Circumvention Servers , 2015, Internet Measurement Conference.

[11]  Lusheng Ji,et al.  Large-Scale Measurement and Characterization of Cellular Machine-to-Machine Traffic , 2013, IEEE/ACM Transactions on Networking.

[12]  Dan S. Wallach,et al.  Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations , 2012, FOCI.

[13]  Margaret Martonosi,et al.  Human mobility modeling at metropolitan scales , 2012, MobiSys '12.

[14]  Roger Piqueras Jover,et al.  Security attacks against the availability of LTE mobility networks: Overview and research directions , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).

[15]  Deborah Estrin,et al.  An Empirical Workload Model for Driving Wide-Area TCP/IP Network Simulations , 2001 .

[16]  Thomas F. La Porta,et al.  Exploiting open functionality in SMS-capable cellular networks , 2008, J. Comput. Secur..

[17]  Paolo Santi,et al.  The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[18]  Vern Paxson,et al.  Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion , 2013, FOCI.

[19]  Georgios Kambourakis,et al.  DoS attacks exploiting signaling in UMTS and IMS , 2011, Comput. Commun..

[20]  Steven M. Bellovin,et al.  "I don't have a photograph, but you can have my footprints.": Revealing the Demographics of Location Data , 2015, ICWSM.

[21]  Jiannong Cao,et al.  Special issue on the Internet of things , 2015, Pervasive and Mobile Computing.

[22]  Masood Khosroshahy,et al.  Botnets in 4G cellular networks: Platforms to launch DDoS attacks against the air interface , 2013, 2013 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT).

[23]  Hui Zang,et al.  Impact of paging channel overloads or attacks on a cellular network , 2006, WiSe '06.

[24]  Patrick P. C. Lee,et al.  On the Detection of Signaling DoS Attacks on 3G Wireless Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[25]  Geoffrey M. Voelker,et al.  Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.

[26]  Terry V. Benzel,et al.  The DETER project: Advancing the science of cyber security experimentation and test , 2010, 2010 IEEE International Conference on Technologies for Homeland Security (HST).

[27]  Patrick D. McDaniel,et al.  On Attack Causality in Internet-Connected Cellular Networks , 2007, USENIX Security Symposium.

[28]  Stefan Lindskog,et al.  How China Is Blocking Tor , 2012, ArXiv.

[29]  J. Seifert,et al.  Rise of the iBots : 0 wning a telco network , 2010 .

[30]  Christian Wietfeld,et al.  Influence of M2M communication on the physical resource utilization of LTE , 2012, Wireless Telecommunications Symposium 2012.

[31]  Zhuoqing Morley Mao,et al.  Internet Censorship in China: Where Does the Filtering Occur? , 2011, PAM.

[32]  Hao Chen,et al.  Exploiting Opportunistic Scheduling in Cellular Data Networks , 2008, NDSS.

[33]  Robert N. M. Watson,et al.  Ignoring the Great Firewall of China , 2006, Privacy Enhancing Technologies.

[34]  Paul S. Henry,et al.  Directions for future cellular mobile network architecture , 2012, First Monday.

[35]  Thomas F. La Porta,et al.  Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks , 2006, IEEE/ACM Transactions on Networking.

[36]  Xin Jin,et al.  SoftCell: Taking Control of Cellular Core Networks , 2013, ArXiv.

[37]  Giuseppe Piro,et al.  Simulating LTE Cellular Systems: An Open-Source Framework , 2011, IEEE Transactions on Vehicular Technology.

[38]  Feng Qian,et al.  Characterizing radio resource allocation for 3G networks , 2010, IMC '10.

[39]  Peter A. Dinda,et al.  Characterizing and modeling user activity on smartphones: summary , 2010, SIGMETRICS '10.

[40]  Roy T. Fielding,et al.  Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing , 2014, RFC.

[41]  Boris Nechaev,et al.  Netalyzr: illuminating the edge network , 2010, IMC '10.

[42]  Manpreet Singh,et al.  Overview of the ORBIT radio grid testbed for evaluation of next-generation wireless network protocols , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[43]  Jian Jiang,et al.  Host of Troubles: Multiple Host Ambiguities in HTTP Implementations , 2016, CCS.

[44]  Hyoung-Kee Choi,et al.  Evaluation of authentication signaling loads in 3GPP LTE/SAE networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.