[PDF][PDF] VoWiFi Security: An Exploration of Non-3GPP Untrusted Access via Public ePDG URLs

F Zampognaro, D Verde, G Bianchi - proceedings of the 2024 Italian …, 2024 - ceur-ws.org
Mobile cellular operators strategically view the integration of alternative access
technologies, such as Wi-Fi, as essential measures to augment network capacity, enhance …

IMS is Not That Secure on Your 5G/4G Phones

J Shi, S Wang, MY Chen, GH Tu, T Xie… - Proceedings of the 30th …, 2024 - dl.acm.org
IMS (IP Multimedia Subsystem) is vital for delivering IP-based multimedia services in mobile
networks. Despite constant upgrades by 3GPP over the past two decades to support …

Exploring the Impact of Big Data Analytics on Emergency Calls within Telecommunication Systems

E Yakar, HH Kilinc - Procedia Computer Science, 2024 - Elsevier
Abstract Big Data Analytics is a critical function in Telecommunication Systems in order to
monitor, measure and report the system's performance for various services. Collecting data …

Why ET Can't Phone Home: A Global View on IP-based Geoblocking at VoWiFi

GK Gegenhuber, PÉ Frenzel, E Weippl - Proceedings of the 22nd Annual …, 2024 - dl.acm.org
In current cellular network generations (4G, 5G) the IMS (IP Multimedia Subsystem) plays an
integral role in terminating voice calls and short messages. Many operators use VoWiFi …

Uncovering Problematic Designs Hindering Ubiquitous Cellular Emergency Services Access

Y Hu, MY Chen, H Yan, CY Cheng, GH Tu… - Proceedings of the 30th …, 2024 - dl.acm.org
Cellular networks provide the most accessible emergency services with ubiquitous
coverage, yet their emergency-specific designs remain largely unexplored. To systematically …

When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities

J Shi, T Xie, GH Tu, C Peng, CY Li… - … IEEE Conference on …, 2023 - ieeexplore.ieee.org
5G/4G voice calls are always encrypted for security and privacy. However, in this work, we
unveil several vulnerabilities which can unintentionally leak 5G/4G call state information …

Securing the Cloud-Native 5G Control Plane

U Kulkarni, S Fahmy - MILCOM 2024-2024 IEEE Military …, 2024 - ieeexplore.ieee.org
The shift to cloud-native architectures in the 5G control plane introduces significant
challenges in securing complex network functions deployed as microservices. Traditional …

An Experimental Study of Denial of Service Attacks on a 5G COTS Hardware

K Baccar, A Lahmadi - 2023 7th Cyber Security in Networking …, 2023 - ieeexplore.ieee.org
While a significant efforts have been made in the specification and deployment of the 5th
generation mobile systems (5G), there is a noticeable lack of practical experiments …

[PDF][PDF] When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities

S Jingwen, X Tian, T Guan-Hua, P Chunyi… - IEEE Conference on …, 2023 - par.nsf.gov
5G/4Gvoicecallsarealwaysencryptedforsecurity… privacy. However, inthis work, we
unveilseveral vulnerabilities whichcanunintentionallyleak5G/4Gcallstate information …