{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:25:29Z","timestamp":1774599929478,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T00:00:00Z","timestamp":1417996800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004955","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["COMET K1"],"award-info":[{"award-number":["COMET K1"]}],"id":[{"id":"10.13039\/501100004955","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,12,8]]},"DOI":"10.1145\/2664243.2664272","type":"proceedings-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T16:30:28Z","timestamp":1418056228000},"page":"246-255","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":102,"title":["IMSI-catch me if you can"],"prefix":"10.1145","author":[{"given":"Adrian","family":"Dabrowski","sequence":"first","affiliation":[{"name":"SBA Research Vienna, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nicola","family":"Pianta","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Cagliari, Cagliari, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thomas","family":"Klepp","sequence":"additional","affiliation":[{"name":"Vienna University of Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Martin","family":"Mulazzani","sequence":"additional","affiliation":[{"name":"SBA Research Vienna, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[{"name":"SBA Research Vienna, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2014,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"GSM security map. http:\/\/gsmmap.org\/.  GSM security map. http:\/\/gsmmap.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"IMSI Catcher Catcher source code. http:\/\/sourceforge.net\/p\/icc\/.  IMSI Catcher Catcher source code. http:\/\/sourceforge.net\/p\/icc\/."},{"key":"e_1_3_2_1_3_1","unstructured":"OsmocomBB open source GSM baseband software implementation. http:\/\/bb.osmocom.org.  OsmocomBB open source GSM baseband software implementation. http:\/\/bb.osmocom.org."},{"key":"e_1_3_2_1_4_1","volume-title":"Ciphering indicator","author":"Android","year":"2009","unstructured":"Android issue 5353 : Ciphering indicator , 2009 . https:\/\/code.google.com\/p\/android\/issues\/detail?id=5353, accessed July 14th 2013. Android issue 5353: Ciphering indicator, 2009. https:\/\/code.google.com\/p\/android\/issues\/detail?id=5353, accessed July 14th 2013."},{"key":"e_1_3_2_1_5_1","volume-title":"via Bittorent","year":"2010","unstructured":"A5\/1 decryption rainbow tables. via Bittorent , 2010 . opensource.srlabs.de\/projects\/a51-decrypt\/files. A5\/1 decryption rainbow tables. via Bittorent, 2010. opensource.srlabs.de\/projects\/a51-decrypt\/files."},{"key":"e_1_3_2_1_6_1","volume-title":"Sales brochure. https:\/\/wikileaks.org\/spyfiles\/files\/0\/80_ABILITY-GSM_3G_Intercept.pdf, accessed Feb 25th","author":"Computers Ability","year":"2014","unstructured":"Ability Computers and Software Industries Ltd . 3 G Interception . Sales brochure. https:\/\/wikileaks.org\/spyfiles\/files\/0\/80_ABILITY-GSM_3G_Intercept.pdf, accessed Feb 25th 2014 . Ability Computers and Software Industries Ltd. 3G Interception. Sales brochure. https:\/\/wikileaks.org\/spyfiles\/files\/0\/80_ABILITY-GSM_3G_Intercept.pdf, accessed Feb 25th 2014."},{"key":"e_1_3_2_1_7_1","unstructured":"Austrian Regulatory Authority for Broadcasting and Telecommunication RTR. Current utilization for GSM of the GSM 1800 frequency band. https:\/\/www.rtr.at\/de\/tk\/1800MHzGSM.  Austrian Regulatory Authority for Broadcasting and Telecommunication RTR. Current utilization for GSM of the GSM 1800 frequency band. https:\/\/www.rtr.at\/de\/tk\/1800MHzGSM."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_24"},{"key":"e_1_3_2_1_9_1","volume-title":"GSM voice-privacy algorithm A5\/1","author":"Briceno M.","year":"1999","unstructured":"M. Briceno , I. Goldberg , and D. Wagner . GSM voice-privacy algorithm A5\/1 , 1999 . http:\/\/www.scard.org\/gsm\/, accessed July 17th 2013. M. Briceno, I. Goldberg, and D. Wagner. GSM voice-privacy algorithm A5\/1, 1999. http:\/\/www.scard.org\/gsm\/, accessed July 17th 2013."},{"key":"e_1_3_2_1_10_1","volume-title":"DEFCON 19","author":"Kristin Paget Chris Paget","year":"2010","unstructured":"Chris Paget aka Kristin Paget . Practical cellphone spying . In DEFCON 19 , 2010 . Chris Paget aka Kristin Paget. Practical cellphone spying. In DEFCON 19, 2010."},{"key":"e_1_3_2_1_11_1","volume-title":"A practical-time attack on the A5\/3 cryptosystem used in third generation gsm telephony","author":"Dunkelman O.","year":"2010","unstructured":"O. Dunkelman , N. Keller , and A. Shamir . A practical-time attack on the A5\/3 cryptosystem used in third generation gsm telephony , 2010 . O. Dunkelman, N. Keller, and A. Shamir. A practical-time attack on the A5\/3 cryptosystem used in third generation gsm telephony, 2010."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1127\/0941-2948\/2008\/0312"},{"key":"e_1_3_2_1_13_1","unstructured":"Ettus Research. Universal software radio peripheral. https:\/\/www.ettus.com\/product.  Ettus Research. Universal software radio peripheral. https:\/\/www.ettus.com\/product."},{"key":"e_1_3_2_1_14_1","volume-title":"Galaxy S III - \"secret codes\" and hidden features","author":"A","year":"2012","unstructured":"E:V: A et al. Galaxy S III - \"secret codes\" and hidden features , 2012 . Pseudonymized online discussion forum, http:\/\/forum.xda-developers.com\/showthread.php?t=1687249, accessed July 14th 2013. E:V:A et al. Galaxy S III - \"secret codes\" and hidden features, 2012. Pseudonymized online discussion forum, http:\/\/forum.xda-developers.com\/showthread.php?t=1687249, accessed July 14th 2013."},{"key":"e_1_3_2_1_15_1","volume-title":"IMSI Catcher\/Spy Detector","author":"A","year":"2012","unstructured":"E:V: A et al. IMSI Catcher\/Spy Detector , 2012 --2014. Pseudonymized online discussion forum, http:\/\/forum.xda-developers.com\/showthread.php?t=1422969, accessed September 7th 2014. E:V:A et al. IMSI Catcher\/Spy Detector, 2012--2014. Pseudonymized online discussion forum, http:\/\/forum.xda-developers.com\/showthread.php?t=1422969, accessed September 7th 2014."},{"key":"e_1_3_2_1_16_1","volume-title":"Sales brochure. info.publicintelligence.net\/Gamma-GSM.pdf, accessed Aug 27th","author":"Gamma Group","year":"2013","unstructured":"Gamma Group . 3 G-GSM Interctiopn & Target Location . Sales brochure. info.publicintelligence.net\/Gamma-GSM.pdf, accessed Aug 27th 2013 . Gamma Group. 3G-GSM Interctiopn & Target Location. Sales brochure. info.publicintelligence.net\/Gamma-GSM.pdf, accessed Aug 27th 2013."},{"key":"e_1_3_2_1_17_1","volume-title":"http:\/\/www.gyokovsolutions.com\/survey\/surveyresults.php, accessed July 15th","author":"NetTrack","year":"2013","unstructured":"G- NetTrack phone measurement capabilities. http:\/\/www.gyokovsolutions.com\/survey\/surveyresults.php, accessed July 15th 2013 . G-NetTrack phone measurement capabilities. http:\/\/www.gyokovsolutions.com\/survey\/surveyresults.php, accessed July 15th 2013."},{"key":"e_1_3_2_1_18_1","first-page":"33","volume-title":"Proceedings of USENIX Security 2013","author":"Golde N.","year":"2013","unstructured":"N. Golde , K. Redon , and J.-P. Seifert . Let me answer that for you: Exploiting broadcast information in cellular networks . In Proceedings of USENIX Security 2013 , pages 33 -- 48 . USENIX, 2013 . N. Golde, K. Redon, and J.-P. Seifert. Let me answer that for you: Exploiting broadcast information in cellular networks. In Proceedings of USENIX Security 2013, pages 33--48. USENIX, 2013."},{"key":"e_1_3_2_1_19_1","volume-title":"Mobile Radio Network Design in the VHF and UHF Bands","author":"Graham A. W.","year":"2007","unstructured":"A. W. Graham , N. C. Kirkman , and P. M. Paul . Mobile Radio Network Design in the VHF and UHF Bands . John Wiley & Sons Ltd , 2007 . A. W. Graham, N. C. Kirkman, and P. M. Paul. Mobile Radio Network Design in the VHF and UHF Bands. John Wiley & Sons Ltd, 2007."},{"key":"e_1_3_2_1_20_1","unstructured":"Prohibiting A5\/2 in mobile stations and other clarifications regarding A5 algorithm support. http:\/\/www.3gpp.org\/ftp\/tsg_sa\/TSG_SA\/TSGS_37\/Docs\/SP-070671.zip.  Prohibiting A5\/2 in mobile stations and other clarifications regarding A5 algorithm support. http:\/\/www.3gpp.org\/ftp\/tsg_sa\/TSG_SA\/TSGS_37\/Docs\/SP-070671.zip."},{"key":"e_1_3_2_1_21_1","first-page":"12","author":"Hummel T.","year":"2013","unstructured":"T. Hummel and L. Neumann . Xgoldscanner , 12 2013 . https:\/\/opensource.srlabs.de\/projects\/mobile-network-assessment-tools\/wiki\/Xgoldscanner, accessed Feb 19th 2014. T. Hummel and L. Neumann. Xgoldscanner, 12 2013. https:\/\/opensource.srlabs.de\/projects\/mobile-network-assessment-tools\/wiki\/Xgoldscanner, accessed Feb 19th 2014.","journal-title":"Xgoldscanner"},{"key":"e_1_3_2_1_22_1","volume-title":"Method for identifying a mobile phone user or for eavesdropping on outgoing calls","author":"Joachim F.","year":"2000","unstructured":"F. Joachim and B. Rainer . Method for identifying a mobile phone user or for eavesdropping on outgoing calls , 2000 . Patent, Rohde & Schwarz, EP 1051053. F. Joachim and B. Rainer. Method for identifying a mobile phone user or for eavesdropping on outgoing calls, 2000. Patent, Rohde & Schwarz, EP1051053."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/647086.715679"},{"key":"e_1_3_2_1_24_1","volume-title":"opensource.srlabs.de\/projects\/catcher, accessed July 12th","author":"Malette L.","year":"2013","unstructured":"L. Malette . Catcher Catcher . opensource.srlabs.de\/projects\/catcher, accessed July 12th 2013 . L. Malette. Catcher Catcher. opensource.srlabs.de\/projects\/catcher, accessed July 12th 2013."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023662"},{"key":"e_1_3_2_1_26_1","volume-title":"The Register","author":"Muncaster P.","year":"2014","unstructured":"P. Muncaster . Chinese cops cuff 1,500 in fake base station spam raid . The Register , 26 Mar 2014 . http:\/\/www.theregister.co.uk\/2014\/03\/26\/spam_text_china_clampdown_police\/. P. Muncaster. Chinese cops cuff 1,500 in fake base station spam raid. The Register, 26 Mar 2014. http:\/\/www.theregister.co.uk\/2014\/03\/26\/spam_text_china_clampdown_police\/."},{"key":"e_1_3_2_1_27_1","volume-title":"Breaking GSM phone privacy. Blackhat","author":"Nohl K.","year":"2010","unstructured":"K. Nohl . Breaking GSM phone privacy. Blackhat 2010 . K. Nohl. Breaking GSM phone privacy. Blackhat 2010."},{"key":"e_1_3_2_1_28_1","volume-title":"Rooting SIM cards. Blackhat","author":"Nohl K.","year":"2013","unstructured":"K. Nohl . Rooting SIM cards. Blackhat 2013 . K. Nohl. Rooting SIM cards. Blackhat 2013."},{"key":"e_1_3_2_1_29_1","volume-title":"Chaos Communications Congress (27C3)","author":"Nohl K.","year":"2010","unstructured":"K. Nohl and S. Munaut . Wideband GSM sniffing . Chaos Communications Congress (27C3) , 2010 . K. Nohl and S. Munaut. Wideband GSM sniffing. Chaos Communications Congress (27C3), 2010."},{"key":"e_1_3_2_1_30_1","unstructured":"osmocom Project. RTL-SDR - osmcomSDR. http:\/\/sdr.osmocom.org\/trac\/wiki\/rtl-sdr accessed March 5th 2014.  osmocom Project. RTL-SDR - osmcomSDR. http:\/\/sdr.osmocom.org\/trac\/wiki\/rtl-sdr accessed March 5th 2014."},{"key":"e_1_3_2_1_31_1","volume-title":"Harvard Journal of Law and Technology","author":"Pell S. K.","year":"2014","unstructured":"S. K. Pell and C. Soghoian . Your secret stingray's no secret anymore: The vanishing government monopoly over cell phone surveillance and its impact on national security and consumer privacy . Harvard Journal of Law and Technology , 2014 . http:\/\/ssrn.com\/abstract=2437678. S. K. Pell and C. Soghoian. Your secret stingray's no secret anymore: The vanishing government monopoly over cell phone surveillance and its impact on national security and consumer privacy. Harvard Journal of Law and Technology, 2014. http:\/\/ssrn.com\/abstract=2437678."},{"key":"e_1_3_2_1_32_1","volume-title":"Technikum Wien","author":"Postl B.","year":"2012","unstructured":"B. Postl . IMSI Catcher . Master's thesis , Technikum Wien , 2012 . B. Postl. IMSI Catcher. Master's thesis, Technikum Wien, 2012."},{"key":"e_1_3_2_1_33_1","volume-title":"Hidden menus in android phone","author":"Richard's","year":"2009","unstructured":"Richard's wireless blog. Hidden menus in android phone , 2009 . http:\/\/rwireless.blogspot.co.at\/2009_03_23_archive.html, accessed July 14th 2013. Richard's wireless blog. Hidden menus in android phone, 2009. http:\/\/rwireless.blogspot.co.at\/2009_03_23_archive.html, accessed July 14th 2013."},{"key":"e_1_3_2_1_34_1","volume-title":"Countering threats early on. www.idexuae.ae\/ExhibitorLibrary\/1328\/Countering_threats_early_on_2.pdf, accessed July 14th","author":"Schwarz Rohde","year":"2013","unstructured":"Rohde & Schwarz . Countering threats early on. www.idexuae.ae\/ExhibitorLibrary\/1328\/Countering_threats_early_on_2.pdf, accessed July 14th 2013 . Rohde & Schwarz. Countering threats early on. www.idexuae.ae\/ExhibitorLibrary\/1328\/Countering_threats_early_on_2.pdf, accessed July 14th 2013."},{"key":"e_1_3_2_1_35_1","volume-title":"Cellular Exploitation on a Global Scale: The Rise and Fall of the Control Protocol. Blackhat","author":"Solnik M.","year":"2014","unstructured":"M. Solnik and M. Blanchou . Cellular Exploitation on a Global Scale: The Rise and Fall of the Control Protocol. Blackhat 2014 , Las Vegas . M. Solnik and M. Blanchou. Cellular Exploitation on a Global Scale: The Rise and Fall of the Control Protocol. Blackhat 2014, Las Vegas."},{"key":"e_1_3_2_1_36_1","volume-title":"http:\/\/www.telit.com\/en\/products\/gsm-gprs.php?p_ac=show&p=3, accessed Feb 22th","author":"Solutions Telit Wireless","year":"2014","unstructured":"Telit Wireless Solutions . GT864-QUAD\/ PY - GSM\/GPRS modules and terminals. http:\/\/www.telit.com\/en\/products\/gsm-gprs.php?p_ac=show&p=3, accessed Feb 22th 2014 . Telit Wireless Solutions. GT864-QUAD\/PY - GSM\/GPRS modules and terminals. http:\/\/www.telit.com\/en\/products\/gsm-gprs.php?p_ac=show&p=3, accessed Feb 22th 2014."},{"key":"e_1_3_2_1_37_1","volume-title":"April","author":"Solutions Telit Wireless","year":"2013","unstructured":"Telit Wireless Solutions . Easy Scan user guide , April 2013 . http:\/\/www.telit.com\/module\/infopool\/download.php?id=6004, accessed July 19th 2013. Telit Wireless Solutions. Easy Scan user guide, April 2013. http:\/\/www.telit.com\/module\/infopool\/download.php?id=6004, accessed July 19th 2013."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504764"},{"key":"e_1_3_2_1_39_1","volume-title":"Albert-Ludwig-Universit\u00e4t Freiburg","author":"Wehrle D.","year":"2009","unstructured":"D. Wehrle . Open source IMSI-Catcher. Master's thesis , Albert-Ludwig-Universit\u00e4t Freiburg , 2009 . D. Wehrle. Open source IMSI-Catcher. Master's thesis, Albert-Ludwig-Universit\u00e4t Freiburg, 2009."}],"event":{"name":"ACSAC '14: Annual Computer Security Applications Conference","location":"New Orleans Louisiana USA","acronym":"ACSAC '14","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 30th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2664243.2664272","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2664243.2664272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:01Z","timestamp":1750227121000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2664243.2664272"}},"subtitle":["IMSI-catcher-catchers"],"short-title":[],"issued":{"date-parts":[[2014,12,8]]},"references-count":39,"alternative-id":["10.1145\/2664243.2664272","10.1145\/2664243"],"URL":"https:\/\/doi.org\/10.1145\/2664243.2664272","relation":{},"subject":[],"published":{"date-parts":[[2014,12,8]]},"assertion":[{"value":"2014-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}