{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:29:01Z","timestamp":1729621741527,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/cns.2017.8228629","type":"proceedings-article","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T19:55:49Z","timestamp":1513886149000},"page":"1-9","source":"Crossref","is-referenced-by-count":9,"title":["Ghost telephonist impersonates you: Vulnerability in 4G LTE CS fallback"],"prefix":"10.1109","author":[{"given":"Yuwei","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Lin","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Haoqi","family":"Shan","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Wenyuan","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM\/UMTS networks, Personal, Indoor and Mobile Radio Communications","author":"meyer","year":"2004","journal-title":"PIMRC 2004 15th IEEE International Symposium on"},{"journal-title":"Defending mobile phones 28C3","year":"0","author":"nohl","key":"ref11"},{"journal-title":"Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks the 22nd USENIX Security Symposium (USENIX Security 13)","year":"2013","author":"golde","key":"ref12"},{"journal-title":"KCon Hacking Conference","article-title":"Seeker, Advanced Fake Base Station Exploitations","year":"2016","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/2500423.2500429","article-title":"How Voice Calls Affect Data in Operational LTE Networks, MobiCom '13","author":"tu","year":"2013","journal-title":"Proceedings of the 19th annual international conference on Mobile computing and networking"},{"journal-title":"The Osmocom Project","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6588662"},{"journal-title":"Security Research Labs A5\/1 Decryption","year":"2010","key":"ref17"},{"key":"ref18","first-page":"29","article-title":"A silent SMS denial of service (DoS) attack","author":"croft","year":"2007","journal-title":"Information and Computer Security Architectures (ICSA) Research Group South Africa"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_13"},{"journal-title":"Mobile radio interface layer 3 specification GSM 04 08","year":"0","key":"ref4"},{"volume":"272","journal-title":"Circuit Switched (CS) Fallback in Evolved Packet System (EPS)","year":"0","key":"ref3"},{"journal-title":"LTE Security and Protocol Exploits ShmooCon","year":"2016","author":"jover","key":"ref6"},{"journal-title":"LTE and IMSI Catcher Myths BlackHat Europe","year":"2015","author":"ravishankar","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813618"},{"key":"ref7","article-title":"Forcing Targeted LTE Cellphone into Unsafe Network","author":"huang","year":"2016","journal-title":"HITB AMS Security Conference"},{"volume":"331","journal-title":"Radio Resource Control (RRC) Protocol Specification","year":"0","key":"ref2"},{"journal-title":"LTE Overview 3 GPP","year":"0","author":"nohrborg","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813718"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.905853"},{"journal-title":"DRAFT NIST Special Publication 800&#x2013;63B Digital Identity Guidelines","year":"0","author":"grassi","key":"ref21"}],"event":{"name":"2017 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2017,10,9]]},"location":"Las Vegas, NV","end":{"date-parts":[[2017,10,11]]}},"container-title":["2017 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8170165\/8228604\/08228629.pdf?arnumber=8228629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,10]],"date-time":"2022-08-10T21:02:13Z","timestamp":1660165333000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8228629\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/cns.2017.8228629","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}