{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:28:42Z","timestamp":1766449722761,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1421933","CNS-1422835"],"award-info":[{"award-number":["CNS-1421933","CNS-1422835"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2660267.2660346","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"727-738","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Real Threats to Your Data Bills"],"prefix":"10.1145","author":[{"given":"Chunyi","family":"Peng","sequence":"first","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]},{"given":"Chi-Yu","family":"Li","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"given":"Hongyi","family":"Wang","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"given":"Guan-Hua","family":"Tu","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, University of California, Los , CA, USA"}]},{"given":"Songwu","family":"Lu","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Millions of cell phones could be vulnerable to this sim card hack.http:\/\/gizmodo.com\/sim-cards-are-hackable-and-researchers-havefound-the-v-860779912 2013.  Millions of cell phones could be vulnerable to this sim card hack.http:\/\/gizmodo.com\/sim-cards-are-hackable-and-researchers-havefound-the-v-860779912 2013."},{"key":"e_1_3_2_1_2_1","unstructured":"Tor. https:\/\/www.torproject.org\/.  Tor. https:\/\/www.torproject.org\/."},{"key":"e_1_3_2_1_3_1","volume-title":"Charging architecture and principles","author":"GPP.","year":"2006","unstructured":"3 GPP. TS32.240 : Charging architecture and principles , 2006 . 3GPP. TS32.240: Charging architecture and principles, 2006."},{"key":"e_1_3_2_1_4_1","volume-title":"UTRAN Iu interface RANAP Signaling","author":"GPP.","year":"2008","unstructured":"3 GPP. TS25.413 : UTRAN Iu interface RANAP Signaling , 2008 . 3GPP. TS25.413: UTRAN Iu interface RANAP Signaling, 2008."},{"key":"e_1_3_2_1_5_1","volume-title":"3G security","author":"GPP.","year":"2012","unstructured":"3 GPP. TS33.210 : 3G security ; Network Domain Security (NDS); IP network layer security, Dec. 2012 . 3GPP. TS33.210: 3G security; Network Domain Security (NDS); IP network layer security, Dec. 2012."},{"key":"e_1_3_2_1_6_1","volume-title":"Policy and Charging Control Architecture","author":"GPP. TS","year":"2013","unstructured":"3 GPP. TS 23.203 : Policy and Charging Control Architecture , 2013 . 3GPP. TS 23.203: Policy and Charging Control Architecture, 2013."},{"key":"e_1_3_2_1_7_1","volume-title":"3GPP SAE","author":"GPP.","year":"2013","unstructured":"3 GPP. TS33.401 : 3GPP SAE ; Security architecture, Sep. 2013 . 3GPP. TS33.401: 3GPP SAE; Security architecture, Sep. 2013."},{"volume-title":"Allot mobiletrends charging report","year":"2011","key":"e_1_3_2_1_8_1","unstructured":"Allot. Allot mobiletrends charging report , 2011 . http:\/\/www.allot.com\/MobileTrendsChargingReport.html. Allot. Allot mobiletrends charging report, 2011. http:\/\/www.allot.com\/MobileTrendsChargingReport.html."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382221"},{"key":"e_1_3_2_1_10_1","unstructured":"AT&T. Data Plans from AT&T.http:\/\/www.att.com\/media\/att\/planner\/index.html.  AT&T. Data Plans from AT&T.http:\/\/www.att.com\/media\/att\/planner\/index.html."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01985757"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.29"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"volume-title":"Cisco GGSN Release 10.0 Configuration Guide","year":"2010","key":"e_1_3_2_1_15_1","unstructured":"Cisco. Cisco GGSN Release 10.0 Configuration Guide , 2010 . Cisco. Cisco GGSN Release 10.0 Configuration Guide, 2010."},{"key":"e_1_3_2_1_16_1","first-page":"2018","author":"Networking Index Cisco Visual","year":"2013","unstructured":"Cisco Visual Networking Index . Global Mobile Data Traffic Forecast Update , 2013 -- 2018 , 2014. http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns341\/ns525\/ns537\/ns705\/ns827\/white_paper_c11--520862.html. Cisco Visual Networking Index. Global Mobile Data Traffic Forecast Update, 2013--2018, 2014. http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns341\/ns525\/ns537\/ns705\/ns827\/white_paper_c11--520862.html.","journal-title":"Global Mobile Data Traffic Forecast Update"},{"key":"e_1_3_2_1_17_1","volume-title":"USENIX Security","author":"Enck W.","year":"2011","unstructured":"W. Enck , D. Octeau , P. McDaniel , and S. Chaudhuri . A study of android application security . In USENIX Security , 2011 . W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of android application security. In USENIX Security, 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102171"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879176"},{"key":"e_1_3_2_1_20_1","volume-title":"FCC approves AT&T acquisition of Qualcomm Licenses","author":"FCC.","year":"2011","unstructured":"FCC. FCC approves AT&T acquisition of Qualcomm Licenses . 2011 . FCC. FCC approves AT&T acquisition of Qualcomm Licenses. 2011."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2444776.2444779"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23118"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342402"},{"key":"e_1_3_2_1_24_1","volume-title":"NDSS","author":"Lever C.","year":"2013","unstructured":"C. Lever , M. Antonakakis , B. Reaves , P. Traynor , and W. Lee . The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers . In NDSS , 2013 . C. Lever, M. Antonakakis, B. Reaves, P. Traynor, and W. Lee. The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers. In NDSS, 2013."},{"volume-title":"Global mobile statistics","year":"2013","key":"e_1_3_2_1_25_1","unstructured":"mobiThinking. Global mobile statistics 2013 . mobiThinking. Global mobile statistics 2013."},{"key":"e_1_3_2_1_26_1","volume-title":"NDSS","author":"Myrto Arapinis E. R. M. R.","year":"2014","unstructured":"E. R. M. R. Myrto Arapinis , Loretta Ilaria Mancini . Privacy through pseudonymity in mobile telephony systems . In NDSS , 2014 . E. R. M. R. Myrto Arapinis, Loretta Ilaria Mancini. Privacy through pseudonymity in mobile telephony systems. In NDSS, 2014."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382220"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348560"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.29"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382258"},{"key":"e_1_3_2_1_31_1","unstructured":"R. Racic D. Ma and H. Chen. Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery. In SecureComm'06.  R. Racic D. Ma and H. Chen. Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery. In SecureComm'06."},{"key":"e_1_3_2_1_32_1","volume-title":"CoRR","author":"Sen S.","year":"2012","unstructured":"S. Sen , C. Joe-Wong , S. Ha , and M. Chiang . Pricing Data: A Look at Past Proposals, Current Plans, and Future Trends . CoRR , 2012 . S. Sen, C. Joe-Wong, S. Ha, and M. Chiang. Pricing Data: A Look at Past Proposals, Current Plans, and Future Trends. CoRR, 2012."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161089.1161111"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653690"},{"key":"e_1_3_2_1_35_1","volume-title":"USENIX Security","author":"Traynor P.","year":"2007","unstructured":"P. Traynor , P. McDaniel , and T. La Porta . On Attack Causality in Internet-Connected Cellular Networks . In USENIX Security , 2007 . P. Traynor, P. McDaniel, and T. La Porta. On Attack Causality in Internet-Connected Cellular Networks. In USENIX Security, 2007."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464439"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516727"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018479"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CCS'14"},"container-title":["Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660346","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2660267.2660346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:10Z","timestamp":1750229770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660346"}},"subtitle":["Security Loopholes and Defenses in Mobile Data Charging"],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":39,"alternative-id":["10.1145\/2660267.2660346","10.1145\/2660267"],"URL":"https:\/\/doi.org\/10.1145\/2660267.2660346","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}