{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T20:48:48Z","timestamp":1772570928074,"version":"3.50.1"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Science and Technology Council (NSTC) in Taiwan","award":["109-2628-E-009-001-MY3"],"award-info":[{"award-number":["109-2628-E-009-001-MY3"]}]},{"name":"National Science and Technology Council (NSTC) in Taiwan","award":["110-2221-E-A49-031-MY3"],"award-info":[{"award-number":["110-2221-E-A49-031-MY3"]}]},{"name":"National Science and Technology Council (NSTC) in Taiwan","award":["111-2218-E-A49-023"],"award-info":[{"award-number":["111-2218-E-A49-023"]}]},{"name":"National Science and Technology Council (NSTC) in Taiwan","award":["111-2218-E-A49-013-MBK"],"award-info":[{"award-number":["111-2218-E-A49-013-MBK"]}]},{"name":"National Science and Technology Council (NSTC) in Taiwan","award":["111-3114-E-A49-001"],"award-info":[{"award-number":["111-3114-E-A49-001"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1815636"],"award-info":[{"award-number":["CNS-1815636"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1814551"],"award-info":[{"award-number":["CNS-1814551"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Center for Open Intelligent Connectivity from the Featured Areas Research Center Program within the framework of the Higher Education Sprout Project by the Ministry of Education (MOE) in Taiwan"},{"DOI":"10.13039\/100017343","name":"National Center for High performance Computing (NCHC) for providing computational and storage resources","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100017343","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1109\/tnet.2022.3205183","type":"journal-article","created":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T19:59:20Z","timestamp":1663617560000},"page":"800-815","source":"Crossref","is-referenced-by-count":12,"title":["Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures"],"prefix":"10.1109","volume":"31","author":[{"given":"Yu-Han","family":"Lu","sequence":"first","affiliation":[{"name":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"given":"Sandy Hsin-Yu","family":"Hsiao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1077-6801","authenticated-orcid":false,"given":"Chi-Yu","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"given":"Yi-Chen","family":"Hsieh","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"given":"Po-Yi","family":"Chou","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"given":"Yao-Yu","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1309-6091","authenticated-orcid":false,"given":"Tian","family":"Xie","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2542-4817","authenticated-orcid":false,"given":"Guan-Hua","family":"Tu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Ericsson Mobility Report","author":"Cerwall","year":"2018"},{"key":"ref2","volume-title":"IP Multimedia Subsystem (IMS); Stage 2 (Release 15)","year":"2019"},{"key":"ref3","volume-title":"IMS Profile for Voice, Video and SMS Over Untrusted Wi-Fi Access","year":"2017"},{"key":"ref4","volume-title":"3GPP System Architecture Evolution (SAE); Security Aspects of Non-3GPP Accesses (Release 15)","year":"2018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4083"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7315"},{"key":"ref7","volume-title":"IMS Profile for Voice and SMS","year":"2017"},{"key":"ref8","volume-title":"3G Security; Access Security for IP-based Services (Release 15)","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4303"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813618"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813718"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978393"},{"key":"ref13","first-page":"1","article-title":"How secure are your VoLTE and VoWiFi calls?","volume-title":"Proc. DeepSec Depth Secur. Conf. Eur. (IDSC)","author":"Chalakkal"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3262"},{"key":"ref15","volume-title":"IP Multimedia Call Control Protocol Based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); Stage 3 (Release 16)","year":"2018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2404"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3312"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3261"},{"key":"ref19","volume-title":"Verizon Conference Calling Services","year":"2022"},{"key":"ref20","volume-title":"Mandatory Speech CODEC Speech Processing Functions; AMR Speech CODEC; General Description","year":"2020"},{"key":"ref21","volume-title":"Speech Codec Speech Processing Functions; Adaptive Multi-Rate-Wideband (AMR-WB) Speech CODEC; General Description","year":"2020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3267"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref24","first-page":"89","volume-title":"Foundations of Machine Learning","author":"Mohri","year":"2012"},{"key":"ref25","volume-title":"Digital Design and Computer Architecture","author":"Harris","year":"2012"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553516"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23236"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00006"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3324927"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23082"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56549-1_13"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2004.1368846"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018479"},{"key":"ref34","first-page":"1","article-title":"The core of the matter: Analyzing malicious traffic in cellular carriers","volume-title":"Proc. IEEE Netw. Distrib. Syst. Secur. Symp. (NDSS)","author":"Lever"},{"key":"ref35","first-page":"1","article-title":"On attack causality in internet-connected cellular networks","volume-title":"Proc. USENIX Conf. Secur. (SEC)","author":"Traynor"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653690"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228629"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.28"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925939"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2320579"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102171"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378626"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359550"},{"key":"ref44","first-page":"1","article-title":"Breaking cell phone authentication: Vulnerabilities in AKA, IMS and android","volume-title":"Proc. 7th USENIX Workshop Offensive Technol. (WOOT)","author":"Beekman"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433136"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274753"},{"key":"ref47","volume-title":"SpoofTel","year":"2022"},{"key":"ref48","volume-title":"SpoofCard","year":"2022"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56538-5_75"},{"key":"ref50","first-page":"575","article-title":"AuthentiCall: Efficient identity and content authentication for phone calls","volume-title":"Proc. USENIX Secur. Symp.","author":"Reaves"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2017.1700019"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2580509"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3267725"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737567"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICTTA.2006.1684926"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1705880"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.2009.5256707"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.73"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS.2006.250469"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/90\/10103748\/9895203-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/10103748\/09895203.pdf?arnumber=9895203","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T21:39:53Z","timestamp":1705959593000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9895203\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":59,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2022.3205183","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4]]}}}