{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T18:36:54Z","timestamp":1769539014002,"version":"3.49.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:00:00Z","timestamp":1603238400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:00:00Z","timestamp":1603238400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,21]]},"DOI":"10.1109\/ictc49870.2020.9289440","type":"proceedings-article","created":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T17:58:16Z","timestamp":1608573496000},"page":"837-842","source":"Crossref","is-referenced-by-count":1,"title":["Long-Term Evolution Vulnerability Focusing on System Information Block Messages"],"prefix":"10.1109","author":[{"given":"Minjae","family":"Kim","sequence":"first","affiliation":[{"name":"University of Science and Technology,Daejeon,Republic of Korea"}]},{"given":"JongGeun","family":"Park","sequence":"additional","affiliation":[{"name":"Electronics and Telecommunications Research Institute,Daejeon,Republic of Korea"}]},{"given":"DaeSung","family":"Moon","sequence":"additional","affiliation":[{"name":"Electronics and Telecommunications Research Institute,Daejeon,Republic of Korea"}]},{"given":"JongSoo","family":"Jang","sequence":"additional","affiliation":[{"name":"Electronics and Telecommunications Research Institute,Daejeon,Republic of Korea"}]},{"given":"YoungSoo","family":"Kim","sequence":"additional","affiliation":[{"name":"Electronics and Telecommunications Research Institute,Daejeon,Republic of Korea"}]},{"given":"JongHoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Electronics and Telecommunications Research Institute,Daejeon,Republic of Korea"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00006"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23349"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2018.8589140"},{"key":"ref13","article-title":"srsLTE","year":"0"},{"key":"ref14","article-title":"USRP X310","year":"0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2013.6692692"},{"key":"ref16","year":"0","journal-title":"Release 16"},{"key":"ref17","article-title":"Evolved universal terrestrial radio access (E-UTRA); radio resource control (RRC); protocol specification","year":"2017","journal-title":"Technical Specification (TS) 36 331 3rd Generation Partnership Project (3GPP) Version 13 4 0"},{"key":"ref18","article-title":"User equipment (UE) procedures in idle mode","year":"2012","journal-title":"Technical Specification (TS) 36 304 3rd Generation Partnership Project (3GPP) Version 9 9 0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23313"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013397"},{"key":"ref6","article-title":"Practical attacks against privacy and availability in 4G\/LTE mobile communication systems","author":"shaik","year":"2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00038"},{"key":"ref8","article-title":"LTE security, protocol exploits and location tracking experimentation with low-cost software radio","author":"jover","year":"2016"},{"key":"ref7","article-title":"Experimental analysis of subscribers&#x2019; privacy exposure by LTE paging","author":"sorseth","year":"2018"},{"key":"ref2","year":"0","journal-title":"Release 14"},{"key":"ref1","article-title":"The evolved packet core","year":"2020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7452266"}],"event":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","location":"Jeju, Korea (South)","start":{"date-parts":[[2020,10,21]]},"end":{"date-parts":[[2020,10,23]]}},"container-title":["2020 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9289075\/9289076\/09289440.pdf?arnumber=9289440","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T05:32:27Z","timestamp":1769491947000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9289440\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,21]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ictc49870.2020.9289440","relation":{},"subject":[],"published":{"date-parts":[[2020,10,21]]}}}