{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:01:52Z","timestamp":1764687712242},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/cycon.2016.7529440","type":"proceedings-article","created":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T20:28:26Z","timestamp":1470342506000},"page":"277-293","source":"Crossref","is-referenced-by-count":8,"title":["We know where you are!"],"prefix":"10.1109","author":[{"given":"Siddharth Prakash","family":"Rao","sequence":"first","affiliation":[]},{"given":"Ian","family":"Oliver","sequence":"additional","affiliation":[]},{"given":"Silke","family":"Holtmanns","sequence":"additional","affiliation":[]},{"given":"Tuomas","family":"Aura","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Release 13","article-title":"TS 44.031 'Location Services (LCS); Mobile Station (MS) - Serving Mobile Location Centre (SMLC) Radio Resource LCS Protocol (RRLP)","year":"2015","key":"ref10"},{"key":"ref11","first-page":"100","article-title":"The GSM system for mobile communications","author":"mouly","year":"1992"},{"year":"2015","key":"ref12","article-title":"SHODAN - search engine for internet connected devices"},{"year":"2010","key":"ref13","article-title":"SMS in GSM Network | Learn Telecom"},{"journal-title":"Release 13","article-title":"Customised Applications for Mobile network Enhanced Logic (CAMEL)","year":"2015","key":"ref14"},{"key":"ref15","article-title":"Liaison Statement on Restoration of R'96 Any Time Interrogation functionality","author":"pudney","year":"2002","journal-title":"3GPP TSG-SA WG2 meeting 22"},{"journal-title":"Release 13","article-title":"Location Services (LCS); Functional description; Stage 2","year":"2015","key":"ref16"},{"key":"ref17","article-title":"Unwired Labs Location API - Geolocation API and Mobile Triangulation API, Cell Tower database","author":"labs","year":"2015","journal-title":"Unwired Labs Location API - Geolocation & Mobile Triangulation API"},{"journal-title":"Release 13","article-title":"3G security; Network Domain Security (NDS); IP network layer security","year":"2015","key":"ref18"},{"article-title":"Signaling System 7 (SS7) security report","year":"2014","author":"technologies","key":"ref19"},{"key":"ref4","article-title":"Mobile self-defense","author":"nohl","year":"2014","journal-title":"31st Chaos Communication Congress (31C3)"},{"key":"ref3","article-title":"SnoopSnitch","author":"labs","year":"0","journal-title":"A laboratory for security research"},{"key":"ref6","article-title":"How to Intercept a Conversation Held on the Other Side of the Planet","author":"puzankov","year":"2014","journal-title":"PHDays"},{"key":"ref5","article-title":"Worldwide attacks on SS7 network","author":"de oliveira","year":"2014","journal-title":"the Hackito Ergo Summit"},{"journal-title":"Release 13","article-title":"Mobile Application Part (MAP) specification","year":"2015","key":"ref8"},{"journal-title":"60 Minutes Show","article-title":"Special Investigation: Bugged, Tracked, Hacked","year":"2015","key":"ref7"},{"journal-title":"31st Chaos Communication Congress (31C3)","article-title":"SS7: Locate. Track. Manipulate","year":"2014","key":"ref2"},{"key":"ref1","article-title":"Locating Mobile Phones using Signaling System 7","author":"engel","year":"2008","journal-title":"25th Chaos Commun Congr"},{"year":"2015","key":"ref9","article-title":"911 Wireless Services"},{"journal-title":"Release 7","article-title":"Study into routing of MT-SMs via the HPLMN","year":"2007","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.500"},{"journal-title":"Currently internal to the GSMA association but to be released to the public later","article-title":"SS7 and SIGTRAN Network Security v1.0","year":"0","key":"ref21"}],"event":{"name":"2016 8th International Conference on Cyber Conflict (CyCon)","start":{"date-parts":[[2016,5,31]]},"location":"Tallinn, Estonia","end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 8th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7524181\/7529414\/07529440.pdf?arnumber=7529440","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T17:15:01Z","timestamp":1474478101000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7529440\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cycon.2016.7529440","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}