{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:28:39Z","timestamp":1766449719717,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1421933,CNS-1422835"],"award-info":[{"award-number":["CNS-1421933,CNS-1422835"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813618","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"316-327","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":61,"title":["Insecurity of Voice Solution VoLTE in LTE Mobile Networks"],"prefix":"10.1145","author":[{"given":"Chi-Yu","family":"Li","sequence":"first","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"given":"Guan-Hua","family":"Tu","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"given":"Chunyi","family":"Peng","sequence":"additional","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]},{"given":"Zengwen","family":"Yuan","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"given":"Yuanjie","family":"Li","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"given":"Songwu","family":"Lu","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"given":"Xinbing","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"unstructured":"\"2014: A VoLTE Security Nightmare?\". http:\/\/tinyurl.com\/p4rpm52.  \"2014: A VoLTE Security Nightmare?\". http:\/\/tinyurl.com\/p4rpm52.","key":"e_1_3_2_1_1_1"},{"unstructured":"Decypt ISPEC packets. http:\/\/tinyurl.com\/ptzurve.  Decypt ISPEC packets. http:\/\/tinyurl.com\/ptzurve.","key":"e_1_3_2_1_2_1"},{"unstructured":"Network info ii. http:\/\/tinyurl.com\/baa6jtu.  Network info ii. http:\/\/tinyurl.com\/baa6jtu.","key":"e_1_3_2_1_3_1"},{"unstructured":"Shark for Root. http:\/\/tinyurl.com\/n7e9ubz.  Shark for Root. http:\/\/tinyurl.com\/n7e9ubz.","key":"e_1_3_2_1_4_1"},{"unstructured":"Voice over LTE. http:\/\/www.gsma.com\/technicalprojects\/volte.  Voice over LTE. http:\/\/www.gsma.com\/technicalprojects\/volte.","key":"e_1_3_2_1_5_1"},{"volume-title":"Jul","year":"2003","author":"RFC","key":"e_1_3_2_1_6_1"},{"volume-title":"Policy and Charging Control Architecture","year":"2013","author":"PP.","key":"e_1_3_2_1_7_1"},{"unstructured":"3GPP. TS23.107:Quality of Service concept and architecture 2014.  3GPP. TS23.107:Quality of Service concept and architecture 2014.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","first-page":"2","article-title":"IP Multimedia Subsystem (IMS);","author":"PP.","year":"2014","journal-title":"Stage"},{"unstructured":"3GPP. TS36.321:E-UTRA; Medium Access Control (MAC) protocol specification Jan 2015.  3GPP. TS36.321:E-UTRA; Medium Access Control (MAC) protocol specification Jan 2015.","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2382196.2382221"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.14722\/ndss.2014.23082"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/2462096.2462100"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/1102120.1102171"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/1314389.1314402"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/1368310.1368333"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.14722\/ndss.2014.23118"},{"key":"e_1_3_2_1_19_1","first-page":"41","article-title":"A Look at VoIP Vulnerabilities","volume":"1","author":"Keromytis A. D.","year":"2010","journal-title":"Login"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1007\/978-3-319-00663-5_3"},{"volume-title":"From Voice over IP to Voice over LTE","year":"2013","author":"Networks N. S.","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1109\/IMSAA.2008.4753937"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/2382196.2382220"},{"volume-title":"ACM CCS","year":"2014","author":"Peng C.","key":"e_1_3_2_1_24_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/2348543.2348560"},{"volume-title":"RFC 3323: A Privacy Mechanism for the Session Initiation Protocol (SIP)","year":"2002","author":"Peterson J.","key":"e_1_3_2_1_26_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1109\/SP.2012.29"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/2382196.2382258"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/SECCOMW.2006.359550"},{"volume-title":"June","year":"2002","key":"e_1_3_2_1_30_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.5555\/1643781"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.5555\/1460557.1460560"},{"volume-title":"USENIX Security","year":"2007","author":"Traynor P.","key":"e_1_3_2_1_33_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/2566486.2568046"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/2462456.2464439"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1109\/CNS.2015.7346856"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1109\/NGMAST.2012.44"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1145\/1533057.1533069"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1109\/SP.2012.16"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS'15","name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA"},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813618","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813618","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:36Z","timestamp":1750225716000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813618"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":38,"alternative-id":["10.1145\/2810103.2813618","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813618","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}