[PDF][PDF] VoWiFi Security: An Exploration of Non-3GPP Untrusted Access via Public ePDG URLs
Mobile cellular operators strategically view the integration of alternative access
technologies, such as Wi-Fi, as essential measures to augment network capacity, enhance …
technologies, such as Wi-Fi, as essential measures to augment network capacity, enhance …
IMS is Not That Secure on Your 5G/4G Phones
IMS (IP Multimedia Subsystem) is vital for delivering IP-based multimedia services in mobile
networks. Despite constant upgrades by 3GPP over the past two decades to support …
networks. Despite constant upgrades by 3GPP over the past two decades to support …
Exploring the Impact of Big Data Analytics on Emergency Calls within Telecommunication Systems
E Yakar, HH Kilinc - Procedia Computer Science, 2024 - Elsevier
Abstract Big Data Analytics is a critical function in Telecommunication Systems in order to
monitor, measure and report the system's performance for various services. Collecting data …
monitor, measure and report the system's performance for various services. Collecting data …
Why ET Can't Phone Home: A Global View on IP-based Geoblocking at VoWiFi
GK Gegenhuber, PÉ Frenzel, E Weippl - Proceedings of the 22nd Annual …, 2024 - dl.acm.org
In current cellular network generations (4G, 5G) the IMS (IP Multimedia Subsystem) plays an
integral role in terminating voice calls and short messages. Many operators use VoWiFi …
integral role in terminating voice calls and short messages. Many operators use VoWiFi …
Uncovering Problematic Designs Hindering Ubiquitous Cellular Emergency Services Access
Cellular networks provide the most accessible emergency services with ubiquitous
coverage, yet their emergency-specific designs remain largely unexplored. To systematically …
coverage, yet their emergency-specific designs remain largely unexplored. To systematically …
When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities
5G/4G voice calls are always encrypted for security and privacy. However, in this work, we
unveil several vulnerabilities which can unintentionally leak 5G/4G call state information …
unveil several vulnerabilities which can unintentionally leak 5G/4G call state information …
Securing the Cloud-Native 5G Control Plane
U Kulkarni, S Fahmy - MILCOM 2024-2024 IEEE Military …, 2024 - ieeexplore.ieee.org
The shift to cloud-native architectures in the 5G control plane introduces significant
challenges in securing complex network functions deployed as microservices. Traditional …
challenges in securing complex network functions deployed as microservices. Traditional …
An Experimental Study of Denial of Service Attacks on a 5G COTS Hardware
K Baccar, A Lahmadi - 2023 7th Cyber Security in Networking …, 2023 - ieeexplore.ieee.org
While a significant efforts have been made in the specification and deployment of the 5th
generation mobile systems (5G), there is a noticeable lack of practical experiments …
generation mobile systems (5G), there is a noticeable lack of practical experiments …
[PDF][PDF] When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities
S Jingwen, X Tian, T Guan-Hua, P Chunyi… - IEEE Conference on …, 2023 - par.nsf.gov
5G/4Gvoicecallsarealwaysencryptedforsecurity… privacy. However, inthis work, we
unveilseveral vulnerabilities whichcanunintentionallyleak5G/4Gcallstate information …
unveilseveral vulnerabilities whichcanunintentionallyleak5G/4Gcallstate information …