{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T19:04:57Z","timestamp":1771614297818,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1109\/milcom61039.2024.10773741","type":"proceedings-article","created":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T18:47:40Z","timestamp":1733510860000},"page":"1088-1093","source":"Crossref","is-referenced-by-count":2,"title":["NReplay: 5G Key Reinstallation Attack Based on NAS Layer Vulnerabilities"],"prefix":"10.1109","author":[{"given":"Wei","family":"Fan","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Bingnan","family":"Shi","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Cheng","family":"Peng","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134027"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485833"},{"key":"ref4","article-title":"Call me maybe: Eaves-dropping encrypted LTE calls with ReVoLTE","volume-title":"Proceedings of the 29th USENIX security symposium","author":"Rupprecht"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-020-00855-0"},{"key":"ref6","article-title":"Technical Specification Group Services and System Aspects; Security architecture and procedures for 5G system","year":"2023","journal-title":"TS33.501, 3rd Generation Partnership Project"},{"key":"ref7","article-title":"Technical Specification Group Core Network and Terminals; Non-Access-Stratum (NAS) protocol for 5G System (5GS); Stage 3","year":"2023","journal-title":"TS24.501, 3rd Generation Partnership Project"},{"key":"ref8","article-title":"Technical Specification Group Services and System Aspects; Procedures for the 5G System (5GS); Stage 2","year":"2023","journal-title":"TS23.502, 3rd Generation Partnership Project"},{"key":"ref9","article-title":"Technical Specification Group Radio Access Network; NR; NR and NG-RAN Overall Description; Stage 2","year":"2023","journal-title":"TS38.300, 3rd Generation Partnership Project"},{"key":"ref10","article-title":"Technical Specification Group Radio Access Network; NR; Medium Access Control (MAC) protocol specification","year":"2023","journal-title":"TS38.321, 3rd Generation Partnership Project"},{"key":"ref11","article-title":"Technical Specification Group Radio Access Network; NR; Radio Link Control (RLC) protocol specification","year":"2023","journal-title":"TS38.322, 3rd Generation Partnership Project"},{"key":"ref12","article-title":"Technical Specification Group Radio Access Network; NR; Packet Data Convergence Protocol (PDCP) specification","year":"2023","journal-title":"TS38.323, 3rd Generation Partnership Project"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7395128"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467826"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3568000"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3205183"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560525"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179353"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2019FOL0001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3296701"},{"key":"ref21","article-title":"Instructions unclear: undefined behaviour in cellular network specifications","volume-title":"Proceedings of the 32nd USENIX Security Symposium (USENIX Security 23)","author":"Klischies"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-16187-y"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3105396"}],"event":{"name":"MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM)","location":"Washington, DC, USA","start":{"date-parts":[[2024,10,28]]},"end":{"date-parts":[[2024,11,1]]}},"container-title":["MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10773620\/10773624\/10773741.pdf?arnumber=10773741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T19:59:35Z","timestamp":1736539175000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10773741\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/milcom61039.2024.10773741","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]}}}