{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:34:24Z","timestamp":1771065264324,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813615","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"340-351","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Defeating IMSI Catchers"],"prefix":"10.1145","author":[{"given":"Fabian","family":"van den Broek","sequence":"first","affiliation":[{"name":"Radboud University, Nijmegen, Netherlands"}]},{"given":"Roel","family":"Verdult","sequence":"additional","affiliation":[{"name":"Radboud University, Radboud University, Netherlands"}]},{"given":"Joeri","family":"de Ruiter","sequence":"additional","affiliation":[{"name":"University of Birmingham, Birmingham, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Callforge: Call anonymity in cellular networks. Technical report","author":"Belle Sebastian Kay","year":"2010"},{"key":"e_1_3_2_1_2_1","volume-title":"NSDI","author":"Lee Sangmin","year":"2013"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_35"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41488-6_13"},{"key":"e_1_3_2_1_5_1","unstructured":"Craig Timberg for The Washington Post. Tech firm tries to pull back curtain on surveillance efforts in washington. http:\/\/wapo.st\/1qgzImt. Last accessed May 2015.  Craig Timberg for The Washington Post. Tech firm tries to pull back curtain on surveillance efforts in washington. http:\/\/wapo.st\/1qgzImt. Last accessed May 2015."},{"key":"e_1_3_2_1_6_1","unstructured":"Craig Timberg for The Washington Post. Feds to study illegal use of spy gear. http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2014\/08\/11\/feds-to-study-illegal-use-of-spy-gear\/. Last accessed May 2015.  Craig Timberg for The Washington Post. Feds to study illegal use of spy gear. http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2014\/08\/11\/feds-to-study-illegal-use-of-spy-gear\/. Last accessed May 2015."},{"key":"e_1_3_2_1_7_1","unstructured":"Siraj Datoo for The Guardian. How tracking customers in-store will soon be the norm. http:\/\/gu.com\/p\/3ym4v\/sbl. Last accessed May 2015.  Siraj Datoo for The Guardian. How tracking customers in-store will soon be the norm. http:\/\/gu.com\/p\/3ym4v\/sbl. Last accessed May 2015."},{"key":"e_1_3_2_1_8_1","volume-title":"June 30","author":"Goldman Stuart Owen","year":"2009"},{"key":"e_1_3_2_1_9_1","volume-title":"September 19","author":"B\u00f6ck Michael","year":"2012"},{"key":"e_1_3_2_1_10_1","unstructured":"Kadhim Shubber for Wired magazine. Tracking devices hidden in London's recycling bins are stalking your smartphone. http:\/\/www.wired.co.uk\/news\/archive\/2013-08\/09\/recycling-bins-are-watching-you. Last accessed May 2015.  Kadhim Shubber for Wired magazine. Tracking devices hidden in London's recycling bins are stalking your smartphone. http:\/\/www.wired.co.uk\/news\/archive\/2013-08\/09\/recycling-bins-are-watching-you. Last accessed May 2015."},{"key":"e_1_3_2_1_11_1","volume-title":"Ruhr-Universit\\\"at Bochum, page 14","author":"Strobel Daehyun","year":"2007"},{"key":"e_1_3_2_1_12_1","volume-title":"NDSS 2012","author":"Golde Nico","year":"2012"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023662"},{"key":"e_1_3_2_1_14_1","unstructured":"ETSI. Digital cellular telecommunications system (Phase 2+); Mobile radio interface layer 3 specification 1998. EN 300 940 \/ GSM 04.08.  ETSI. Digital cellular telecommunications system (Phase 2+); Mobile radio interface layer 3 specification 1998. EN 300 940 \/ GSM 04.08."},{"key":"e_1_3_2_1_15_1","unstructured":"ETSI. Universal Mobile Telecommunications System (UMTS);LTE;Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3 2015. 3GPP TS 24.301 version 12.7.0 Release 12.  ETSI. Universal Mobile Telecommunications System (UMTS);LTE;Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3 2015. 3GPP TS 24.301 version 12.7.0 Release 12."},{"key":"e_1_3_2_1_16_1","unstructured":"ETSI. Digital cellular telecommunications system (Phase 2+);UMTS;LTE;3G security;Security architecture 2013. 3GPP TS 33.102 version 11.5.0 Release 11.  ETSI. Digital cellular telecommunications system (Phase 2+);UMTS;LTE;3G security;Security architecture 2013. 3GPP TS 33.102 version 11.5.0 Release 11."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23082"},{"key":"e_1_3_2_1_18_1","volume-title":"Advanced encryption standard (AES)","author":"PUB","year":"2001"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_20"},{"key":"e_1_3_2_1_21_1","first-page":"1","article-title":"Recommendation for block cipher modes of operation: The CMAC mode for authentication","volume":"38","author":"Dworkin Morris","year":"2005","journal-title":"NIST Special Publication (800--38B)"},{"key":"e_1_3_2_1_22_1","volume-title":"The keyed-hash message authentication code (hmac)","author":"PUB","year":"2008"},{"key":"e_1_3_2_1_23_1","volume-title":"Secure hash algorithm-3 (SHA-3) standard: Permutation-based hash and extendable-output functions","author":"PUB","year":"2014"},{"key":"e_1_3_2_1_24_1","volume-title":"An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*","author":"ETSI.","year":"2014"},{"key":"e_1_3_2_1_25_1","first-page":"3","article-title":"cellular telecommunications system (Phase 2+);Universal Mobile Telecommunications System (UMTS);LTE;Mobile radio interface Layer 3 specification;Core network protocols;","author":"Digital ETSI.","year":"2015","journal-title":"Stage"},{"key":"e_1_3_2_1_26_1","unstructured":"ETSI. Universal Mobile Telecommunications System (UMTS); Formal Analysis of the 3G Authentication Protocol 2001. 3GPP TR 33.902 version 4.0.0 Release 4.  ETSI. Universal Mobile Telecommunications System (UMTS); Formal Analysis of the 3G Authentication Protocol 2001. 3GPP TR 33.902 version 4.0.0 Release 4."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382221"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/11908739_11"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1674-7_39"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_31_1","volume-title":"Mobile Network Codes (MNC) for the international identification plan for public networks and subscriptions","author":"TSB - Telecommunication Standardization Bureau of ITU.","year":"2014"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/242896.242897"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_1"},{"key":"e_1_3_2_1_34_1","first-page":"1","volume-title":"Fast Software Encryption (FSE 2000","author":"Biryukov Alex","year":"2000"},{"key":"e_1_3_2_1_35_1","unstructured":"Marc Briceno Ian Goldberg and David Wagner. A pedagogical implementation of the GSM A5\/1 and A5\/2 \"voice privacy\" encryption algorithms. http:\/\/cryptome.org\/gsm-a512.htm (originally on www.scard.org) 1999. Last accessed April 2014.  Marc Briceno Ian Goldberg and David Wagner. A pedagogical implementation of the GSM A5\/1 and A5\/2 \"voice privacy\" encryption algorithms. http:\/\/cryptome.org\/gsm-a512.htm (originally on www.scard.org) 1999. Last accessed April 2014."},{"key":"e_1_3_2_1_36_1","volume-title":"5th Benelux Workshop on Information and System Security (WISSec 2010)","author":"van den Broek Fabian","year":"2010"},{"key":"e_1_3_2_1_37_1","unstructured":"Ian Goldberg and Marc Briceno. GSM cloning. http:\/\/www.isaac.cs.berkeley.edu\/isaac\/gsm.html.  Ian Goldberg and Marc Briceno. GSM cloning. http:\/\/www.isaac.cs.berkeley.edu\/isaac\/gsm.html."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/872752.873511"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2005.8"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664272"},{"key":"e_1_3_2_1_42_1","volume-title":"Snoopsnitch website. https:\/\/opensource.srlabs.de\/projects\/snoopsnitch. Last accessed","author":"Labs SR","year":"2014"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07782-6_56"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813615","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:36Z","timestamp":1750225716000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813615"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":43,"alternative-id":["10.1145\/2810103.2813615","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813615","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}