{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:28:45Z","timestamp":1766449725458,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,12]],"date-time":"2016-10-12T00:00:00Z","timestamp":1476230400000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["ONR N000141512162"],"award-info":[{"award-number":["ONR N000141512162"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["IITP-2015-R0992-15-1006"],"award-info":[{"award-number":["IITP-2015-R0992-15-1006"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2013R1A1A1076024"],"award-info":[{"award-number":["NRF-2013R1A1A1076024"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["DARPA-15-15-TC-FP-006"],"award-info":[{"award-number":["DARPA-15-15-TC-FP-006"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF DGE-1500084"],"award-info":[{"award-number":["NSF DGE-1500084"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813718","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T11:22:12Z","timestamp":1444130532000},"page":"328-339","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Breaking and Fixing VoLTE"],"prefix":"10.1145","author":[{"given":"Hongil","family":"Kim","sequence":"first","affiliation":[{"name":"KAIST, Dajeon, South Korea"}]},{"given":"Dongkwan","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Dajeon, South Korea"}]},{"given":"Minhee","family":"Kwon","sequence":"additional","affiliation":[{"name":"KAIST, Dajeon, South Korea"}]},{"given":"Hyungseok","family":"Han","sequence":"additional","affiliation":[{"name":"KAIST, Dajeon, South Korea"}]},{"given":"Yeongjin","family":"Jang","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, USA"}]},{"given":"Dongsu","family":"Han","sequence":"additional","affiliation":[{"name":"KAIST, Dajeon, South Korea"}]},{"given":"Taesoo","family":"Kim","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, USA"}]},{"given":"Yongdae","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Dajeon, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Policy and charging control architecture","author":"GPP. ETSI TS","year":"2012","unstructured":"3GPP. ETSI TS 23.203. Policy and charging control architecture, 2012."},{"key":"e_1_3_2_1_2_1","volume-title":"Architectural requirements","author":"GPP. ETSI TS","year":"2011","unstructured":"3GPP. ETSI TS 23.221. Architectural requirements, 2011."},{"key":"e_1_3_2_1_3_1","first-page":"2","author":"Multimedia GPP. ETSI TS","year":"2011","unstructured":"3GPP. ETSI TS 23.228. IP Multimedia Subsystem (IMS) Stage 2, 2011.","journal-title":"Stage"},{"key":"e_1_3_2_1_4_1","volume-title":"Access security for IP-based services","author":"GPP. ETSI TS","year":"2011","unstructured":"3GPP. ETSI TS 33.203. Access security for IP-based services, 2011."},{"key":"e_1_3_2_1_5_1","volume-title":"Network Domain Security (NDS)","author":"GPP. ETSI TS","year":"2011","unstructured":"3GPP. ETSI TS 33.210. Network Domain Security (NDS); IP network layer security, 2011."},{"key":"e_1_3_2_1_6_1","volume-title":"Trustzone: Integrated hardware and software security. ARM white paper, 3(4):18--24","author":"Alves T.","year":"2004","unstructured":"T. Alves and D. Felton. Trustzone: Integrated hardware and software security. ARM white paper, 3(4):18--24, 2004."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3329"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534748.2534755"},{"key":"e_1_3_2_1_9_1","volume-title":"Reliable UDP protocol. draft-ietf-sigtran-reliable-udp-00.txt","author":"Bova T.","year":"1999","unstructured":"T. Bova and T. Krivoruchka. Reliable UDP protocol. draft-ietf-sigtran-reliable-udp-00.txt, 1999."},{"key":"e_1_3_2_1_10_1","volume-title":"CCC","author":"Delugre G.","year":"2011","unstructured":"G. Delugre. Reverse engineering a Qualcomm baseband. CCC, 2011."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102171"},{"volume-title":"January","year":"2013","key":"e_1_3_2_1_12_1","unstructured":"Ericsson. What is voice over LTE?, January 2013."},{"key":"e_1_3_2_1_13_1","volume-title":"Evolution to LTE report","author":"Global mobile Suppliers Association and others.","year":"2015","unstructured":"Global mobile Suppliers Association and others. Evolution to LTE report, 2015. {Online; accessed 11-May-2015}."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23118"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2444776.2444779"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534770"},{"key":"e_1_3_2_1_17_1","volume-title":"Voice and Video calls over LTE. {Online","author":"GSM Association","year":"2015","unstructured":"GSM Association. Voice and Video calls over LTE. {Online; accessed 14-May-2015}."},{"key":"e_1_3_2_1_18_1","volume-title":"Version 1.1","author":"GSM Association","year":"2014","unstructured":"GSM Association. VoLTE Service Description and Implementation Guidelines, Version 1.1, 2014."},{"key":"e_1_3_2_1_19_1","volume-title":"NDSS","author":"Houmansadr A.","year":"2013","unstructured":"A. Houmansadr, T. J. Riedl, N. Borisov, and A. C. Singer. I want my voice to be heard: IP over Voice-over-IP for Unobservable Censorship Circumvention. In NDSS, 2013."},{"key":"e_1_3_2_1_20_1","volume-title":"in World LTE market","author":"IDATE.","year":"2014","unstructured":"IDATE. in World LTE market, 2014. {Online; accessed 11-May-2015}."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4579"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382210"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028091"},{"key":"e_1_3_2_1_24_1","volume-title":"VOIP Wars: Return of the SIP","author":"\u00d6zavci F.","year":"2013","unstructured":"F. \u00d6zavci. VOIP Wars: Return of the SIP, 2013."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382220"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660346"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348560"},{"key":"e_1_3_2_1_28_1","volume-title":"NDSS","author":"Qian Z.","year":"2012","unstructured":"Z. Qian, Z. Wang, Q. Xu, Z. M. Mao, M. Zhang, and Y.-M. Wang. You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks. In NDSS, 2012."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3261"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653690"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1362903.1362924"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464439"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382212"},{"key":"e_1_3_2_1_34_1","first-page":"2","author":"Wang Z.","year":"2008","unstructured":"Z. Wang. IMS Security Framework. 3GPP2 S. S0086-B, Version, 2, 2008.","journal-title":"Version"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533069"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1323276.1323280"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813718","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813718","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:31:25Z","timestamp":1763458285000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813718"}},"subtitle":["Exploiting Hidden Data Channels and Mis-implementations"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":36,"alternative-id":["10.1145\/2810103.2813718","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813718","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}