{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:01:55Z","timestamp":1764687715443},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319457185"},{"type":"electronic","value":"9783319457192"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45719-2_13","type":"book-chapter","created":{"date-parts":[[2016,9,5]],"date-time":"2016-09-05T22:11:24Z","timestamp":1473113484000},"page":"279-302","source":"Crossref","is-referenced-by-count":26,"title":["The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection"],"prefix":"10.1007","author":[{"given":"Adrian","family":"Dabrowski","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Georg","family":"Petzl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Edgar R.","family":"Weippl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,9,7]]},"reference":[{"key":"13_CR1","unstructured":"Digital cellular telecommunications system (Phase 2+); Interworking between Phase 1 infrastructure and Phase 2 Mobile Stations (MS). http:\/\/www.etsi.org\/deliver\/etsi_ts\/101600_101699\/101644\/05.01.00_60\/ts_101644v050100p.pdf"},{"key":"13_CR2","unstructured":"GSM security map. http:\/\/gsmmap.org\/"},{"key":"13_CR3","unstructured":"How the NSA pinpoints a mobile device. http:\/\/apps.washingtonpost.com\/g\/page\/world\/how-the-nsa-pinpoints-a-mobile-device\/645\/ . Accessed 30 Oct 2015"},{"key":"13_CR4","unstructured":"Digital cellular telecommunications system (Phase 2+); Location Services (LCS); Mobile Station (MS) - Serving Mobile Location Centre (SMLC) Radio Resource LCS Protocol (RRLP), 3GPP TS 04.31 version 8.18.0 (2007). http:\/\/www.etsi.org\/deliver\/etsi_ts\/101500_101599\/101527\/08.18.00_60\/ts_101527v081800p.pdf"},{"key":"13_CR5","unstructured":"Egypt tries to control the use of GPS by banning except with individual licences (2008). http:\/\/www.balancingact-africa.com\/news\/en\/issue-no-429\/top-story\/egypt-tries-to-contr\/en"},{"key":"13_CR6","unstructured":"Emergency Communications (EMTEL); European Public Warning System (EU-ALERT) using the Cell Broadcast Service (2012). http:\/\/www.etsi.org\/deliver\/etsi_ts\/102900_102999\/102900\/01.01.01_60\/ts_102900v010101p.pdf"},{"key":"13_CR7","unstructured":"Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Numbering, addressing and identification (2014). http:\/\/www.etsi.org\/deliver\/etsi_ts\/123000_123099\/123003\/12.04.01_60\/ts_123003v120401p.pdf"},{"key":"13_CR8","unstructured":"3rd Generation Partnership Project: Non-Access-Stratum (NAS) Functions related to Mobile Station (MS) in Idle Mode, 3GPP TS 23.122 v8.2.0"},{"key":"13_CR9","unstructured":"3rd Generation Partnership Project: Technical Specification Group Core Network and Terminals; Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS), 3GPP TS 24.301"},{"issue":"3","key":"13_CR10","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1007\/s00145-007-9001-y","volume":"21","author":"E Barkan","year":"2008","unstructured":"Barkan, E., Biham, E., Keller, N.: Instant ciphertext-only cryptanalysis of GSM encrypted communication. J. Cryptol. 21(3), 392\u2013429 (2008)","journal-title":"J. Cryptol."},{"key":"13_CR11","unstructured":"Briceno, M., Goldberg, I., Wagner, D.: An implementation of the GSM A3A8 algorithm. (Specifically, COMP128.). http:\/\/www.scard.org\/gsm\/a3a8.txt . Accessed 24 Jun 2016"},{"key":"13_CR12","unstructured":"Briceno, M., Goldberg, I., Wagner, D.: GSM Cloning. http:\/\/www.isaac.cs.berkeley.edu\/isaac\/gsm.html . Accessed 24 Jun 2016"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"van den Broek, F., Verdult, R., de Ruiter, J.: Defeating IMSI catchers. In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), pp. 340\u2013351. ACM (2015)","DOI":"10.1145\/2810103.2813615"},{"key":"13_CR14","unstructured":"Paget, C. (Kristin Paget): Practical Cellphone Spying. In: DEFCON 19 (2010)"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., Weippl, E.: IMSI-Catch me if you can: IMSI-catcher-catchers. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC 2014). ACM, December 2014","DOI":"10.1145\/2664243.2664272"},{"key":"13_CR16","series-title":"Communications in Computer and Information Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-981-287-936-3_13","volume-title":"Soft Computing in Data Science","author":"T Do van","year":"2015","unstructured":"van Do, T., Nguyen, H.T., Momchil, N., et al.: Detecting IMSI-catcher using soft computing. In: Berry, M.W., Mohamed, A.H., Yap, B.W. (eds.) Soft Computing in Data Science. CCIS, vol. 545, pp. 129\u2013140. Springer, Heidelberg (2015)"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Dunkelman, O., Keller, N., Shamir, A.: A practical-time attack on the A5\/3 cryptosystem used in third generation GSM telephony. IACR Cryptology ePrint Archive 2010, 13 (2010)","DOI":"10.1007\/978-3-642-14623-7_21"},{"issue":"1","key":"13_CR18","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1109\/TIT.2002.806129","volume":"49","author":"P Ekdahl","year":"2003","unstructured":"Ekdahl, P., Johansson, T.: Another attack on A5\/1. IEEE Trans. Inf. Theor. 49(1), 284\u2013289 (2003)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"13_CR19","unstructured":"Engel, T.: SS7: Locate. Track. Manipulate, at 31C3 (2014). https:\/\/events.ccc.de\/congress\/2014\/Fahrplan\/events\/6249.html . Accessed 30 Oct 2015"},{"key":"13_CR20","unstructured":"Ettus Research: Universal Software Radio Peripheral. https:\/\/www.ettus.com\/product"},{"key":"13_CR21","unstructured":"Farivar, C.: Apple removes GPS functionality from Egyptian iPhones (2008). http:\/\/www.macworld.com\/article\/1137410\/Apple_removes_GPS_func.html"},{"key":"13_CR22","unstructured":"Gamma Group: 3G-GSM Interctiopn and Target Location. Sales brochure. https:\/\/info.publicintelligence.net\/Gamma-GSM.pdf . Accessed 2 Nov 2015"},{"key":"13_CR23","unstructured":"Goldberg, I., Wagner, D., Green, L.: The (Real-Time) Cryptanalysis of A5\/2. In: Rump Session of Crypto 1999 (1999)"},{"key":"13_CR24","unstructured":"GSM Association: IR.50 2G 2.5G 3G Roaming v4.0 (2008). http:\/\/www.gsma.com\/newsroom\/all-documents\/ir-50-2g2-5g3g-roaming\/ . Accessed 25 Sep 2015"},{"key":"13_CR25","unstructured":"Prohibiting A5\/2 in mobile stations and other clarifications regarding A5 algorithm support. http:\/\/www.3gpp.org\/ftp\/tsg_sa\/TSG_SA\/TSGS_37\/Docs\/SP-070671.zip"},{"issue":"11","key":"13_CR26","doi-asserted-by":"crossref","first-page":"1498","DOI":"10.1109\/TC.2008.80","volume":"57","author":"T G\u00fcneysu","year":"2008","unstructured":"G\u00fcneysu, T., Kasper, T., Novotny, M., Paar, C., Rupp, A.: Cryptanalysis with COPACOBANA. IEEE Trans. Comput. 57(11), 1498\u20131513 (2008)","journal-title":"IEEE Trans. Comput."},{"key":"13_CR27","unstructured":"Steve, H.D.: Cracking GSM. In: Black Hat DC, March 2008 (2008)"},{"key":"13_CR28","unstructured":"Joachim, F., Rainer, B.: Method for identifying a mobile phone user or for eavesdropping on outgoing calls, patent, Rohde & Schwarz, EP1051053 (2000)"},{"key":"13_CR29","unstructured":"SR Labs: Kraken: A5\/1 Decryption Rainbow Tables. via Bittorent (2010). https:\/\/opensource.srlabs.de\/projects\/a51-decrypt . Accessed 12 Nov 2015"},{"key":"13_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1007\/978-3-319-24174-6_24","volume-title":"Computer Security\u2013ESORICS 2015","author":"J Liu","year":"2015","unstructured":"Liu, J., Yu, Y., Standaert, F.X., Guo, Z., Gu, D., Sun, W., Ge, Y., Xie, X.: Small tweaks do not help: differential power analysis of MILENAGE implementations in 3G\/4G USIM cards. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9326, pp. 468\u2013480. Springer, Heidelberg (2015)"},{"key":"13_CR31","unstructured":"Malette, L.: Catcher Catcher. https:\/\/opensource.srlabs.de\/projects\/mobile-network-assessment-tools\/wiki\/CatcherCatcher . Accessed 12 Nov 2015"},{"key":"13_CR32","unstructured":"Muncaster, P.: Chinese cops cuff 1,500 in fake base station spam raid. The Register, 26 March 2014. http:\/\/www.theregister.co.uk\/2014\/03\/26\/spam_text_china_clampdown_police\/"},{"key":"13_CR33","unstructured":"Nohl, K.: Rooting SIM cards. In: Blackhat (2013)"},{"key":"13_CR34","unstructured":"Nohl, K.: Mobile self-defense, 31C3 (2014). https:\/\/events.ccc.de\/congress\/2014\/Fahrplan\/events\/6122.html . Accessed 30 Oct 2015"},{"key":"13_CR35","unstructured":"Osipov, A., Zaitsev, A.: Adventures in Femtoland: 350 Yuan for invaluable fun. In: Black Hat USA 2015, August 2015"},{"key":"13_CR36","unstructured":"Pell, S.K., Soghoian, C.: Your secret stingray\u2019s no secret anymore: the vanishing government monopoly over cell phone surveillance and its impact on national security and consumer privacy. Harvard J. Law Technol. 28(1) (2014)"},{"key":"13_CR37","unstructured":"SecUpwN (Pseudonym, Maintainer): Android IMSI-Catcher Detector. https:\/\/secupwn.github.io\/Android-IMSI-Catcher-Detector\/ . Accessed 12 Nov 2015"},{"key":"13_CR38","unstructured":"Shaik, A., Borgaonkar, R., Asokan, N., Niemi, V., Seifert, J.: Practical attacks against privacy and availability in 4G\/LTE mobile communication systems (2015). http:\/\/arxiv.org\/abs\/1510.07563"},{"key":"13_CR39","unstructured":"Solnik, M., Blanchou, M.: Cellular exploitation on a global scale: the rise and fall of the control protocol. In: Blackhat 2014, Las Vegas (2014)"},{"key":"13_CR40","unstructured":"SR Labs: Snoopsnitch, December 2014. https:\/\/opensource.srlabs.de\/projects\/snoopsnitch . Accessed 12 Nov 2015"},{"key":"13_CR41","unstructured":"Tu, G., Li, Y., Peng, C., Li, C., Raza, M.T., Tseng, H., Lu, S.: New threats to sms-assisted mobile internet services from 4G LTE networks (2015). http:\/\/arxiv.org\/abs\/1510.08531"},{"key":"13_CR42","unstructured":"Welte, H.: OpenBSC - running your own GSM network, talk at Hacking at Random, August 2009. https:\/\/openbsc.osmocom.org\/trac\/raw-attachment\/wiki\/FieldTests\/HAR2009\/har2009-gsm-report.pdf"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45719-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T02:25:34Z","timestamp":1568341534000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45719-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319457185","9783319457192"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45719-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}