{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:11:33Z","timestamp":1774631493487,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472358, 61702451"],"award-info":[{"award-number":["61472358, 61702451"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-0845671"],"award-info":[{"award-number":["CNS-0845671"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Fundamental Research Funds for the Central Universities 2017","award":["QNA4017"],"award-info":[{"award-number":["QNA4017"]}]},{"name":"the High-Tech Research and Development Program of China (863-China Cloud Major Program)","award":["2015AA01A201"],"award-info":[{"award-number":["2015AA01A201"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196521","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"261-272","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":57,"title":["FBSleuth"],"prefix":"10.1145","author":[{"given":"Zhou","family":"Zhuang","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Xiaoyu","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Taimin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Juchuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Wenyuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Zhenhua","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Yunhao","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University &amp;Michigan State University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"mbox","author":"Dare Abodunrin","year":"2015","unstructured":"Dare Abodunrin et al mbox .. 2015 . Detection and Mitigation methodology for Fake Base Stations Detection on 3G\/2G Cellular Networks . (2015). Dare Abodunrin et almbox.. 2015. Detection and Mitigation methodology for Fake Base Stations Detection on 3G\/2G Cellular Networks. (2015)."},{"key":"e_1_3_2_1_2_1","unstructured":"Alex Linus Jakob and Luca Karsten. 2017. SnoopSnitch project. https:\/\/opensource.srlabs.de\/projects\/snoopsnitch. (2017).  Alex Linus Jakob and Luca Karsten. 2017. SnoopSnitch project. https:\/\/opensource.srlabs.de\/projects\/snoopsnitch. (2017)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2014.6911088"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Alaaedine Chouchane Slim Rekhis and Noureddine Boudriga. 2009. Defending against rogue base station attacks using wavelet based fingerprinting.  Alaaedine Chouchane Slim Rekhis and Noureddine Boudriga. 2009. Defending against rogue base station attacks using wavelet based fingerprinting.","DOI":"10.1109\/AICCSA.2009.5069374"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2008.123"},{"key":"e_1_3_2_1_6_1","volume-title":"Radiometric identification of LTE transmitters","author":"Demers Frederic","unstructured":"Frederic Demers and Marc St-Hilaire . 2013. Radiometric identification of LTE transmitters . In GLOBECOM. IEEE , 4116--4121. Frederic Demers and Marc St-Hilaire. 2013. Radiometric identification of LTE transmitters. In GLOBECOM. IEEE, 4116--4121."},{"key":"e_1_3_2_1_7_1","volume-title":"Romit Roy Choudhury, and Srihari Nelakuditi","author":"Dey Sanorita","year":"2014","unstructured":"Sanorita Dey , Nirupam Roy , Wenyuan Xu , Romit Roy Choudhury, and Srihari Nelakuditi . 2014 . AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. NDSS. Sanorita Dey, Nirupam Roy, Wenyuan Xu, Romit Roy Choudhury, and Srihari Nelakuditi. 2014. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. NDSS."},{"key":"e_1_3_2_1_8_1","volume-title":"An RF-DNA verification process for ZigBee networks MILCOM","author":"Temple Ramsey Benjamin W","unstructured":"Ramsey Benjamin W Temple Michael A Dubendorfer , Clay K. 2012. An RF-DNA verification process for ZigBee networks MILCOM . IEEE , 1--6. Ramsey Benjamin W Temple Michael A Dubendorfer, Clay K. 2012. An RF-DNA verification process for ZigBee networks MILCOM. IEEE, 1--6."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1029\/2000RS002345"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664272"},{"key":"e_1_3_2_1_12_1","volume-title":"2014 National Wireless and Mobile Communication symposium","author":"Gang Du","year":"2014","unstructured":"Du Gang , Zhang Chen , Zhu Yanyun , Du Xuetao , and Meng Dexiang . 2014 . Research on mobile Rogue base station locating and tracking method . 2014 National Wireless and Mobile Communication symposium (2014). Du Gang, Zhang Chen, Zhu Yanyun, Du Xuetao, and Meng Dexiang. 2014. Research on mobile Rogue base station locating and tracking method. 2014 National Wireless and Mobile Communication symposium (2014)."},{"key":"e_1_3_2_1_13_1","volume-title":"Detection of transient in radio frequency fingerprinting using signal phase. Wireless and Optical Communications","author":"Hall Jeyanthi","year":"2003","unstructured":"Jeyanthi Hall , Michel Barbeau , and Evangelos Kranakis . 2003. Detection of transient in radio frequency fingerprinting using signal phase. Wireless and Optical Communications ( 2003 ), 13--18. Jeyanthi Hall, Michel Barbeau, and Evangelos Kranakis. 2003. Detection of transient in radio frequency fingerprinting using signal phase. Wireless and Optical Communications (2003), 13--18."},{"key":"e_1_3_2_1_14_1","unstructured":"Jeyanthi Hall Michel Barbeau and Evangelos Kranakis. 2004. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting.. In Communications Internet and Information Technology. 201--206.  Jeyanthi Hall Michel Barbeau and Evangelos Kranakis. 2004. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting.. In Communications Internet and Information Technology. 201--206."},{"key":"e_1_3_2_1_15_1","volume-title":"Radio frequency fingerprinting for intrusion detection in wireless networks","author":"Hall Jeyanthi","year":"2005","unstructured":"Jeyanthi Hall , Michel Barbeau , and Evangelos Kranakis . 2005. Radio frequency fingerprinting for intrusion detection in wireless networks . IEEE Transactions on Defendable and Secure Computing ( 2005 ). Jeyanthi Hall, Michel Barbeau, and Evangelos Kranakis. 2005. Radio frequency fingerprinting for intrusion detection in wireless networks. IEEE Transactions on Defendable and Secure Computing (2005)."},{"key":"e_1_3_2_1_16_1","volume-title":"Research and Practice of \"Pseduo Base Station\" Digital Forensic. Computer Science","author":"ZHAO","year":"2016","unstructured":"ZHAO Jian-qiang. 2016. Research and Practice of \"Pseduo Base Station\" Digital Forensic. Computer Science ( 2016 ). ZHAO Jian-qiang. 2016. Research and Practice of \"Pseduo Base Station\" Digital Forensic. Computer Science (2016)."},{"key":"e_1_3_2_1_17_1","volume-title":"VTC 2008-Fall. IEEE 68th. IEEE, 1--5.","author":"Kennedy Irwin O","year":"2008","unstructured":"Irwin O Kennedy , Patricia Scanlon , Francis J Mullany , Milind M Buddhikot , Keith E Nolan , and Thomas W Rondeau . 2008 . Radio transmitter fingerprinting: A steady state frequency domain approach Vehicular Technology Conference, 2008 . VTC 2008-Fall. IEEE 68th. IEEE, 1--5. Irwin O Kennedy, Patricia Scanlon, Francis J Mullany, Milind M Buddhikot, Keith E Nolan, and Thomas W Rondeau. 2008. Radio transmitter fingerprinting: A steady state frequency domain approach Vehicular Technology Conference, 2008. VTC 2008-Fall. IEEE 68th. IEEE, 1--5."},{"key":"e_1_3_2_1_18_1","volume-title":"Specific emitter identification for cognitive radio with application to IEEE 802.11 IEEE GLOBECOM","author":"Kim Kyouwoong","year":"2008","unstructured":"Kyouwoong Kim , Chad M Spooner , Ihsan Akbar , and Jeffrey H Reed . 2008. Specific emitter identification for cognitive radio with application to IEEE 802.11 IEEE GLOBECOM 2008 . IEEE , 1--5. Kyouwoong Kim, Chad M Spooner, Ihsan Akbar, and Jeffrey H Reed. 2008. Specific emitter identification for cognitive radio with application to IEEE 802.11 IEEE GLOBECOM 2008. IEEE, 1--5."},{"key":"e_1_3_2_1_19_1","unstructured":"Mobile Radio Interface Layer. 3. Specification GSM 04.08 v 4.2. 0 Oct. 1992 Bates Nos. QBB479485--977 (. 3).  Mobile Radio Interface Layer. 3. Specification GSM 04.08 v 4.2. 0 Oct. 1992 Bates Nos. QBB479485--977 (. 3)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23098"},{"key":"e_1_3_2_1_21_1","unstructured":"Karsten Linus. 2013. CatcherCatcher. https:\/\/opensource.srlabs.de\/projects\/mobile-network-assessment-tools\/wiki\/CatcherCatcher. (2013).  Karsten Linus. 2013. CatcherCatcher. https:\/\/opensource.srlabs.de\/projects\/mobile-network-assessment-tools\/wiki\/CatcherCatcher. (2013)."},{"key":"e_1_3_2_1_22_1","volume-title":"International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security. 235--246","author":"Stig","unstructured":"Stig F. Mjolsness and Ruxandra F. Olimid. 2017. Easy 4G\/LTE IMSI Catchers for Non-Programmers . In International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security. 235--246 . Stig F. Mjolsness and Ruxandra F. Olimid. 2017. Easy 4G\/LTE IMSI Catchers for Non-Programmers. In International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security. 235--246."},{"key":"e_1_3_2_1_23_1","volume-title":"2014 Seventh International Conference on. IEEE, 33--37","author":"Mondal Riaz","year":"2014","unstructured":"Riaz Mondal , Jussi Turkka , Tapani Ristaniemi , and Tero Henttonen . 2014 . Performance evaluation of MDT assisted LTE RF fingerprint framework Mobile Computing and Ubiquitous Networking (ICarnegie Mellon University) , 2014 Seventh International Conference on. IEEE, 33--37 . Riaz Mondal, Jussi Turkka, Tapani Ristaniemi, and Tero Henttonen. 2014. Performance evaluation of MDT assisted LTE RF fingerprint framework Mobile Computing and Ubiquitous Networking (ICarnegie Mellon University), 2014 Seventh International Conference on. IEEE, 33--37."},{"key":"e_1_3_2_1_24_1","volume-title":"Device fingerprinting to enhance wireless security using nonparametric Bayesian method INFOCOM","author":"Nguyen Nam Tuan","year":"2011","unstructured":"Nam Tuan Nguyen , Guanbo Zheng , Zhu Han , and Rong Zheng . 2011. Device fingerprinting to enhance wireless security using nonparametric Bayesian method INFOCOM , 2011 Proceedings IEEE. IEEE , 1404--1412. Nam Tuan Nguyen, Guanbo Zheng, Zhu Han, and Rong Zheng. 2011. Device fingerprinting to enhance wireless security using nonparametric Bayesian method INFOCOM, 2011 Proceedings IEEE. IEEE, 1404--1412."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2014.2372432"},{"key":"e_1_3_2_1_26_1","volume-title":"A practical attack against gprs\/edge\/umts\/hspa mobile data communications. Black Hat DC","author":"Perez David","year":"2011","unstructured":"David Perez and Jose Pico . 2011. A practical attack against gprs\/edge\/umts\/hspa mobile data communications. Black Hat DC ( 2011 ). David Perez and Jose Pico. 2011. A practical attack against gprs\/edge\/umts\/hspa mobile data communications. Black Hat DC (2011)."},{"key":"e_1_3_2_1_27_1","unstructured":"Qihoo. 2018. 360 Skyeye. https:\/\/skyeye.360safe.com\/. (2018).  Qihoo. 2018. 360 Skyeye. https:\/\/skyeye.360safe.com\/. (2018)."},{"key":"e_1_3_2_1_28_1","volume-title":"Third International Conference on. IEEE, 331--340","author":"Rasmussen Kasper Bonne","year":"2007","unstructured":"Kasper Bonne Rasmussen and Srdjan Capkun . 2007 . Implications of radio fingerprinting on the security of sensor networks Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007 . Third International Conference on. IEEE, 331--340 . Kasper Bonne Rasmussen and Srdjan Capkun. 2007. Implications of radio fingerprinting on the security of sensor networks Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on. IEEE, 331--340."},{"key":"e_1_3_2_1_29_1","volume-title":"Improving intra-cellular security using air monitoring with RF fingerprints IEEE WCNC","author":"Reising Donald R","year":"2010","unstructured":"Donald R Reising , Michael A Temple , and Michael J Mendenhall . 2010. Improving intra-cellular security using air monitoring with RF fingerprints IEEE WCNC 2010 . IEEE , 1--6. Donald R Reising, Michael A Temple, and Michael J Mendenhall. 2010. Improving intra-cellular security using air monitoring with RF fingerprints IEEE WCNC 2010. IEEE, 1--6."},{"key":"e_1_3_2_1_30_1","unstructured":"Mary Ann Russon. 2014. 19 Fake Mobile Base Stations Found Across US. http:\/\/www.ibtimes.co.uk\/19-fake-mobile-base-stations-found. (2014).  Mary Ann Russon. 2014. 19 Fake Mobile Base Stations Found Across US. http:\/\/www.ibtimes.co.uk\/19-fake-mobile-base-stations-found. (2014)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.20462"},{"key":"e_1_3_2_1_32_1","unstructured":"sohu. 2016. Demystifying the Industrial Chain of Fake Base Stations. http:\/\/news.sohu.com\/20160412\/n443925430.shtml. (2016).  sohu. 2016. Demystifying the Industrial Chain of Fake Base Stations. http:\/\/news.sohu.com\/20160412\/n443925430.shtml. (2016)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.7.2.275-281"},{"key":"e_1_3_2_1_34_1","volume-title":"Using spectral fingerprints to improve wireless network security IEEE GLOBECOM","author":"William C","year":"2008","unstructured":"William C Suski II, Michael A Temple , Michael J Mendenhall , and Robert F Mills . 2008. Using spectral fingerprints to improve wireless network security IEEE GLOBECOM 2008 . IEEE , 1--5. William C Suski II, Michael A Temple, Michael J Mendenhall, and Robert F Mills. 2008. Using spectral fingerprints to improve wireless network security IEEE GLOBECOM 2008. IEEE, 1--5."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2004.1532524"},{"key":"e_1_3_2_1_36_1","volume-title":"Conference Proceedings., IEEE","volume":"2","author":"Toonstra J","year":"1995","unstructured":"J Toonstra and Wintold Kinsner . 1995 . Transient analysis and genetic algorithms for classification WESCANEX 95. Communications, Power, and Computing . Conference Proceedings., IEEE , Vol. Vol. 2 . IEEE, 432--437. J Toonstra and Wintold Kinsner. 1995. Transient analysis and genetic algorithms for classification WESCANEX 95. Communications, Power, and Computing. Conference Proceedings., IEEE, Vol. Vol. 2. IEEE, 432--437."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Oktay Ureten and Nur Serinken. 1999. Bayesian detection of radio transmitter turn-on transients. NSIp. 830--834.  Oktay Ureten and Nur Serinken. 1999. Bayesian detection of radio transmitter turn-on transients. NSIp. 830--834.","DOI":"10.1049\/el:19991369"},{"key":"e_1_3_2_1_38_1","volume-title":"The effectiveness of a homemade IMSI catcher build with YateBTS and a BladeRF","author":"van Rijsbergen Kenneth","unstructured":"Kenneth van Rijsbergen . 2016. The effectiveness of a homemade IMSI catcher build with YateBTS and a BladeRF . University of Amsterdam (2016) . Kenneth van Rijsbergen. 2016. The effectiveness of a homemade IMSI catcher build with YateBTS and a BladeRF. University of Amsterdam (2016)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2010.21"},{"key":"e_1_3_2_1_40_1","volume-title":"2010 b. Augmenting bit-level network security using physical layer RF-DNA fingerprinting IEEE GLOBECOM","author":"Williams McKay D","year":"2010","unstructured":"McKay D Williams , Michael A Temple , and Donald R Reising . 2010 b. Augmenting bit-level network security using physical layer RF-DNA fingerprinting IEEE GLOBECOM 2010 ). IEEE , 1--6. McKay D Williams, Michael A Temple, and Donald R Reising. 2010 b. Augmenting bit-level network security using physical layer RF-DNA fingerprinting IEEE GLOBECOM 2010). IEEE, 1--6."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0021-1"},{"key":"e_1_3_2_1_42_1","article-title":"Security Measures and Weaknesses of the GPRS Security Architecture","volume":"6","author":"Xenakis Christos","year":"2008","unstructured":"Christos Xenakis . 2008 . Security Measures and Weaknesses of the GPRS Security Architecture . International Journal of Network Security Vol. 6 , 2 (2008). Christos Xenakis. 2008. Security Measures and Weaknesses of the GPRS Security Architecture. International Journal of Network Security Vol. 6, 2 (2008).","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2476338"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860035"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196521","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196521","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196521"}},"subtitle":["Fake Base Station Forensics via Radio Frequency Fingerprinting"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":44,"alternative-id":["10.1145\/3196494.3196521","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196521","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}