• Publications
  • Influence
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems
Mobile communication systems now constitute an essential part of life throughout the world. Fourth generation "Long Term Evolution" (LTE) mobile communication networks are being deployed. The LTEExpand
  • 162
  • 26
  • PDF
New privacy issues in mobile telephony: fix and verification
TLDR
We expose two novel threats to the user privacy in 3G telephony systems, which make it possible to trace and identify mobile telephony subscribers, and demonstrate the feasibility of a low cost implementation of these attacks. Expand
  • 135
  • 14
  • PDF
SMS-Based One-Time Passwords: Attacks and Defense - (Short Paper)
TLDR
We analyze the security architecture of SMS OTP systems and study attacks that pose a threat to Internet-based authentication and authorization services. Expand
  • 56
  • 6
  • PDF
Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications
TLDR
We show that femtocells, miniature cellular base stations installed in homes and businesses, are equally trusted yet are placed in possibly untrustworthy hands. Expand
  • 68
  • 5
  • PDF
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
TLDR
We reveal a new privacy attack against all variants of the AKA protocol, including 5G AKA, that breaches subscriber privacy more severely than known location privacy attacks do. Expand
  • 28
  • 4
  • PDF
White-Stingray: Evaluating IMSI Catchers Detection Applications
TLDR
We develop White-Stingray, a systematic framework with various attacking capabilities in 2G and 3G networks, and used it for our study. Expand
  • 17
  • 4
  • PDF
Characterizing SEAndroid Policies in the Wild
TLDR
We analyse SEAndroid policies from a number of 5.0 Lollipop devices on the market, and identify patterns of common problems we found. Expand
  • 14
  • 2
  • PDF
An Analysis of the Asprox Botnet
TLDR
The presence of large pools of compromised computers, also known as botnets, or zombie armies, represents a very serious threat to Internet security. Expand
  • 19
  • 1
  • PDF
Security analysis of a femtocell device
TLDR
We demonstrate several security flaws that allowing attackers to gain root access and to install malicious applications on the femtocell. Expand
  • 28
  • 1
Security Usability of Petname Systems
TLDR
This paper provides an analysis of the Petname Model by describing its history and background, properties, application domains and usability issues with emphasis on Security Usability. Expand
  • 17
  • 1
  • PDF