Security Testing of GSM Implementations

@inproceedings{Broek2014SecurityTO,
  title={Security Testing of GSM Implementations},
  author={Fabian van den Broek and Brinio Hond and Arturo Cedillo Torres},
  booktitle={ESSoS},
  year={2014}
}
Right after its introduction, GSM security was reviewed in a mostly theoretical way, uncovering some major security issues. However, the costs and complexity of the required hardware prohibited most people from exploiting these weaknesses in practice and GSM became one of the most successful technologies ever introduced. However, there is an enormous amount of mobile enabled equipment out there in the wild, which not only have exploitable weaknesses following from the GSM specifications, but… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 15 references

Injecting SMS Messages into Smart Phones for Security Analysis

Collin Mulliner Deutsche Telekom
2009
View 4 Excerpts
Highly Influenced

GSM cell broadcast service security analysis

Arturo Cedillo Torres
Master’s thesis, • 2013
View 1 Excerpt

Fuzzing embedded devices

Rikke Kuipers, Ari Takanen
GreHack • 2012
View 1 Excerpt

Fuzzing the GSM protocol. Master’s thesis, Radboud University Nijmegen, Kerckhoff’s

Brinio Hond
Master, The Netherlands, • 2011
View 1 Excerpt

Anatomy of contemporary GSM cellphone hardware. http: // laforge. gnumonks. org/ papers/ gsm_ phone-anatomy-latest

Harald Welte
2010
View 1 Excerpt

The baseband apocalypse

Ralf-Philipp Weinmann
Chaos Communication Congress Berlin, • 2010
View 1 Excerpt

Similar Papers

Loading similar papers…