Search 204,990,983 papers from all elds of science Search Sign In Create Free Account
DOI: 10.1155/2019/7425235 • Corpus ID: 203980463
LTE Phone Number Catcher: A Practical Attack against Mobile
Privacy
Chuan Yu, Shuhui Chen, Zhiping Cai • Published 30 September 2019 • Computer Science • Secur. Commun. Networks
Phone number is a unique identity code of a mobile subscriber, which plays a more important role in the mobile social network life than another
identi cation number IMSI. Unlike the IMSI, a mobile device never transmits its own phone number to the network side in the radio. However, the
mobile network may send a user’s phone number to another mobile terminal when this user initiating a call or SMS service. Based on the above
facts, with the help of an IMSI catcher and 2G man-in-the-middle… Expand
View PDF Save to Library Create Alert Cite
Abstract Figures 11 Citations 13 References Related Papers
Figures from this paper
Figure 1 Figure 2 Figure 3 Figure 5
View All 7 Figures & Tables
11 Citations
Search within citations Citation Type More Filters Sort by Relevance
Personal phone number privacy-preserving models for public use
Alanazi Rayan, Hamoud H. Alshammari • Computer Science • Journal of Discrete Mathematical Sciences and Cryptography • 2021
TLDR This paper proposes an alternative: Virtual Mobile Number Model (VMNM) that links a user’s real mobile number with a virtual mobile
number to help secure individual privacy and evaluates the model and explains how it helps to protect the user's privacy as well as prevent
personal data from being violated. Expand
View 1 excerpt, cites background Save Alert
IMSI Catchers in the wild: A real world 4G/5G assessment
I. Palamà, F. Gringoli, G. Bianchi, N. Blefari-Melazzi • Computer Science • Comput. Networks • 2021
4 • Save Alert
The diverse and variegated reactions of different cellular devices to IMSI catching attacks
I. Palamà, F. Gringoli, G. Bianchi, N. Blefari-Melazzi • Computer Science • WiNTECH@MOBICOM • 2020
TLDR Assessment of how different User Terminals react to IMSI-catching attacks, namely location privacy attacks aiming at gathering the
user's International Mobile Subscriber Identity, shows that successfulness of the attack depends only on the chipset and the SDR tool.
Expand
2 PDF • Save Alert
Measuring the Deployment of 5G Security Enhancement
Shiyue Nie, Yiming Zhang, T. Wan, Haixin Duan, Song Li • Computer Science • WISEC • 2022
TLDR 5G security features and implementation in commercial 5G networks are analyzed and results show that major discrepancy exists
between 5G security standards and real world deployment, especially in the areas of UP protection and subscriber identi er protection.
Expand
Save Alert
Anomaly Detection Algorithms for Location Security in 5G Scenarios
S. Bartoletti, I. Palamà, D. Orlando, G. Bianchi, N. Blefari-Melazzi • Computer Science • ArXiv • 2021
TLDR This paper concretely focuses on two classes of threats: noise-like jammers, whose objective is to reduce the signal-tonoise ratio, and
spoo ng/meaconing attacks, whose objectives is to inject false or erroneous information into the receiver. Expand
1 PDF • View 1 excerpt, cites background Save Alert
On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats
Anna Angelogianni, I. Politis, Farnaz Mohammadi, C. Xenakis • Computer Science • IEEE Access • 2020
TLDR The proposed methodology has been designed to aid both, mobile operators towards planning more effective cybersecurity strategies
and adopting e cient defences to minimise the probability of an attack and predict its impact on the operational, market and business
aspects of mobile network operators. Expand
4 PDF • View 1 excerpt, cites background Save Alert
SigUnder: a stealthy 5G low power attack and defenses
Norbert Ludant, G. Noubir • Computer Science • WISEC • 2021
TLDR SicUnder, an attack that enables an adversary to overshadow the Signal Synchronization Block with an injected signal at 3.4dB below
the legitimate signal is disclosed and SIC under, an extension of Successive Interference Cancellation is introduced to be able to address the
unique challenges that SigUnder poses. Expand
3 • Save Alert
E cient privacy-preservation scheme for securing urban P2P VANET networks
B. Alaya • Computer Science • 2020
1 • Save Alert
Threat modeling framework for mobile communication systems
S. Rao, S. Holtmanns, T. Aura • Computer Science • ArXiv • 2020
TLDR This work systematically organize the attacks on mobile communications into various tactics and techniques, designed to model
adversarial behavior in terms of its attack phases and to be used as a common taxonomy matrix. Expand
3 PDF • Save Alert
Adversarial Trends in Mobile Communication Systems: From Attack Patterns to Potential Defenses Strategies
Hsin Yi Chen, S. Rao • Computer Science • Secure IT Systems • 2021
Save Alert
1 2
References
SHOWING 1-10 OF 13 REFERENCES SORT BY Relevance
◀
The GSM/UMTS Phone Number Catcher
Yubo Song, Xili Hu, Zhiling Lan • Computer Science • 2011 Third International Conference on Multimedia Information Networking and Security • 2011
TLDR The GSM protocol which is relevant to the phone number catcher is analyzed and later the performance of such a system by real tests
and demonstrate its feasibility are presented. Expand
13 • View 1 excerpt, references methods Save Alert
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems
Altaf Shaik, J. Seifert, R. Borgaonkar, N. Asokan, Valtteri Niemi • Computer Science • NDSS • 2016
TLDR This work constitutes the rst publicly reported practical attacks against LTE access network protocols and recommends that safety
margins introduced into future speci cations to address such trade-offs should incorporate greater agility to accommodate subsequent
changes in the trade-off equilibrium. Expand
220 PDF • View 1 excerpt, references methods Save Alert
LTE security, protocol exploits and location tracking experimentation with low-cost software radio
R. Jover • Computer Science • ArXiv • 2016
TLDR This manuscript, which summarizes and expands the results presented by the author at ShmooCon 2016, investigates the insecurity
rationale behind LTE protocol exploits and LTE rogue base stations based on the analysis of real LTE radio link captures from the production
network. Expand
49 PDF • View 1 excerpt, references background Save Alert
Easy 4G/LTE IMSI Catchers for Non-Programmers
S. F. Mjølsnes, Ruxandra F. Olimid • Computer Science • MMM-ACNS • 2017
TLDR This work demonstrates that IMSI Catcher attacks are really practical for the state-of-the-art 4G/LTE mobile systems too and can be
easily built and operated using readily available tools and equipment, and without any programming. Expand
42 PDF • View 2 excerpts, references background Save Alert
Exposing LTE Security Weaknesses at Protocol Inter-layer, and Inter-radio Interactions
M. T. Raza, F. Anwar, Songwu Lu • Computer Science • SecureComm • 2017
TLDR This work categorizes the uncovered vulnerabilities in three dimensions, i.e., authentication, security association and service
availability, and veri es these vulnerabilities in operational LTE networks and proposes remedies for the identi ed attacks. Expand
13 PDF • Save Alert
Security attacks against the availability of LTE mobility networks: Overview and research directions
R. Jover • Computer Science • 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC) • 2013
TLDR An overview of the current threat landscape against the availability of LTE mobility networks is presented and a set of areas of focus
that should be considered in mobility security in order to guarantee availability against security attacks are identi ed. Expand
94 • Save Alert
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE
Syed Ra ul Hussain, Omar Chowdhury, Shagufta Mehnaz, E. Bertino • Computer Science, Mathematics • NDSS • 2018
TLDR A modelbased testing approach LTEInspector is proposed which lazily combines a symbolic model checker and a cryptographic
protocol veri er in the symbolic attacker model for exposing vulnerabilities in the 4G LTE protocol. Expand
122 PDF • View 1 excerpt, references background Save Alert
Demo: OpenAirInterface: an open LTE network in a PC
N. Nikaein, R. Knopp, +4 authors R. Ghaddab • Computer Science • MobiCom • 2014
TLDR This work presents OpenAirInterface (OAI) as a suitably exible platform towards open LTE ecosystem and playground and
demonstrates an example of the use of OAI to deploy a low-cost open LTE network using commodity hardware with standard LTE-compatible
devices. Expand
82 • View 1 excerpt, references background Save Alert
Software De ned Radio Architectures Systems And Functions
Frank Wannemaker • Computer Science • 2016
TLDR This software de ned radio architectures systems and functions will help people to enjoy a good book with a cup of coffee in the
afternoon instead of having to cope with some malicious virus inside their computer. Expand
89 PDF • View 1 excerpt, references background Save Alert
Edge-enabled Disaster Rescue
F. Liu, Yeting Guo, Zhiping Cai, Nong Xiao, Ziming Zhao • Computer Science • ACM Trans. Intell. Syst. Technol. • 2019
TLDR Echo, a highly time-e cient disaster rescue framework based on edge computing, is proposed and an adaptive photo detector is
designed to utilize the precious and unstable communication bandwidth effectively, as well as ensure the photo detection precision and recall
rate. Expand
6 • View 1 excerpt, references background Save Alert
1 2
Related Papers
Stay Connected With Semantic Scholar Your E-mail Address Sign Up
What Is Semantic Scholar? About Product Research Help
Semantic Scholar is a free, AI-powered research tool for About Us Beta Program Team FAQ
scienti c literature, based at the Allen Institute for AI. Publishers S2AG API Publications Librarians
Learn More Blog Semantic Reader Projects Tutorials
Careers Resources Contact
Proudly built by AI2
Collaborators & Attributions • Terms of Service • Privacy Policy