{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:18:26Z","timestamp":1775326706131,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Intel","award":["NSF\/Intel ICN-WEN program"],"award-info":[{"award-number":["NSF\/Intel ICN-WEN program"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1657124 and CNS-1719369"],"award-info":[{"award-number":["CNS-1657124 and CNS-1719369"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3323402","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Insecure connection bootstrapping in cellular networks"],"prefix":"10.1145","author":[{"given":"Syed Rafiul","family":"Hussain","sequence":"first","affiliation":[{"name":"Purdue University"}]},{"given":"Mitziu","family":"Echeverria","sequence":"additional","affiliation":[{"name":"University of Iowa"}]},{"given":"Ankush","family":"Singla","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Omar","family":"Chowdhury","sequence":"additional","affiliation":[{"name":"University of Iowa"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. 3GPP Release 15. http:\/\/www.3gpp.org\/release-15.  {n. d.}. 3GPP Release 15. http:\/\/www.3gpp.org\/release-15."},{"key":"e_1_3_2_1_2_1","volume-title":"d.}. 5G","unstructured":"{n. d.}. 5G ; Security architecture and procedures for 5G System (3GPP TS 33.501 version 15.1.0 Release 15). {n. d.}. 5G; Security architecture and procedures for 5G System (3GPP TS 33.501 version 15.1.0 Release 15)."},{"key":"e_1_3_2_1_3_1","unstructured":"{n. d.}. Cell-Site Simulators\/IMSI Catchers. https:\/\/www.eff.org\/pages\/cell-site-simulatorsimsi-catchers.  {n. d.}. Cell-Site Simulators\/IMSI Catchers. https:\/\/www.eff.org\/pages\/cell-site-simulatorsimsi-catchers."},{"key":"e_1_3_2_1_4_1","unstructured":"{n. d.}. Embedded SIM Remote Provisioning Architecture (Version 1.1). https:\/\/www.gsma.com\/iot\/wp-content\/uploads\/2014\/01\/1.-GSMA-Embedded-SIM-Remote-Provisioning-Architecture-Version-1.1.pdf.  {n. d.}. Embedded SIM Remote Provisioning Architecture (Version 1.1). https:\/\/www.gsma.com\/iot\/wp-content\/uploads\/2014\/01\/1.-GSMA-Embedded-SIM-Remote-Provisioning-Architecture-Version-1.1.pdf."},{"key":"e_1_3_2_1_5_1","unstructured":"{n. d.}. Protecting IMSI and User Privacy in 5G Networks. www.ericsson.com\/res\/docs\/2016\/protecting-imsi-and-user-privacy-in-5g-networks.pdf.  {n. d.}. Protecting IMSI and User Privacy in 5G Networks. www.ericsson.com\/res\/docs\/2016\/protecting-imsi-and-user-privacy-in-5g-networks.pdf."},{"key":"e_1_3_2_1_6_1","unstructured":"{n. d.}. Qualcomm Snapdragon 845 Mobile Platform. https:\/\/www.qualcomm.com\/media\/documents\/files\/snapdragon-845-mobile-platform-product-brief.pdf.  {n. d.}. Qualcomm Snapdragon 845 Mobile Platform. https:\/\/www.qualcomm.com\/media\/documents\/files\/snapdragon-845-mobile-platform-product-brief.pdf."},{"key":"e_1_3_2_1_7_1","unstructured":"{n. d.}. srsLTE. https:\/\/github.com\/srsLTE.  {n. d.}. srsLTE. https:\/\/github.com\/srsLTE."},{"key":"e_1_3_2_1_8_1","unstructured":"{n. d.}. srsUE. https:\/\/github.com\/srsLTE\/srsUE.  {n. d.}. srsUE. https:\/\/github.com\/srsLTE\/srsUE."},{"key":"e_1_3_2_1_9_1","unstructured":"{n.d.}. USRP B210. https:\/\/www.ettus.com\/product\/details\/UB210-KIT.  {n.d.}. USRP B210. https:\/\/www.ettus.com\/product\/details\/UB210-KIT."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Dare Abodunrin Yoan Miche and Silke Holtmanns. 2015. Some Dangers from 2G Networks Legacy Support and a Possible Mitigation. In Communications and Network Security (CNS). 585--593.  Dare Abodunrin Yoan Miche and Silke Holtmanns. 2015. Some Dangers from 2G Networks Legacy Support and a Possible Mitigation. In Communications and Network Security (CNS). 585--593.","DOI":"10.1109\/CNS.2015.7346872"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21771-5_30"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382221"},{"key":"e_1_3_2_1_13_1","volume-title":"Eike Ritter, and Mark Ryan.","author":"Arapinis Myrto","year":"2014","unstructured":"Myrto Arapinis , Loretta Ilaria Mancini , Eike Ritter, and Mark Ryan. 2014 . Privacy through Pseudonymity in Mobile Telephony Systems. In NDSS. Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, and Mark Ryan. 2014. Privacy through Pseudonymity in Mobile Telephony Systems. In NDSS."},{"key":"e_1_3_2_1_14_1","unstructured":"American Bankers Association et al. 1999. Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm. American National Standard X 9 (1999).  American Bankers Association et al. 1999. Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm. American National Standard X 9 (1999)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766171.1766207"},{"key":"e_1_3_2_1_16_1","volume-title":"Advances in Cryptology --- EUROCRYPT","author":"Boneh Dan","year":"2003","unstructured":"Dan Boneh , Craig Gentry , Ben Lynn , and Hovav Shacham . 2003. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps . In Advances in Cryptology --- EUROCRYPT 2003 , Eli Biham (Ed .). 416--432. Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. 2003. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In Advances in Cryptology --- EUROCRYPT 2003, Eli Biham (Ed.). 416--432."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"David Cooper Stefan Santesson Stephen Farrell Sharon Boeyen Russell Housley and Tim Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Technical Report 5280. http:\/\/www.ietf.org\/rfc\/rfc5280.txt  David Cooper Stefan Santesson Stephen Farrell Sharon Boeyen Russell Housley and Tim Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Technical Report 5280. http:\/\/www.ietf.org\/rfc\/rfc5280.txt","DOI":"10.17487\/rfc5280"},{"key":"e_1_3_2_1_18_1","volume-title":"Weippl","author":"Dabrowski Adrian","year":"2016","unstructured":"Adrian Dabrowski , George Petzl , and Edgar R . Weippl . 2016 . The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection. In International Symposium on Research in Attacks, Intrusions, and Defenses. Springer , Cham, 279--302. Adrian Dabrowski, George Petzl, and Edgar R. Weippl. 2016. The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection. In International Symposium on Research in Attacks, Intrusions, and Defenses. Springer, Cham, 279--302."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664272"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 19th Annual Network & Distributed System Security Symposium.","author":"Golde Nico","year":"2012","unstructured":"Nico Golde , K\u00e9vin Redon , and Ravishankar Borgaonkar . 2012 . Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications . In Proceedings of the 19th Annual Network & Distributed System Security Symposium. Nico Golde, K\u00e9vin Redon, and Ravishankar Borgaonkar. 2012. Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications. In Proceedings of the 19th Annual Network & Distributed System Security Symposium."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 22Nd USENIX Conference on Security. 33--48","author":"Golde Nico","year":"2013","unstructured":"Nico Golde , K\u00e9vin Redon , and Jean-Pierre Seifert . 2013 . Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks . In Proceedings of the 22Nd USENIX Conference on Security. 33--48 . Nico Golde, K\u00e9vin Redon, and Jean-Pierre Seifert. 2013. Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks. In Proceedings of the 22Nd USENIX Conference on Security. 33--48."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23313"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23442"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"e_1_3_2_1_25_1","volume-title":"Paul C Van Oorschot, and Scott A Vanstone","author":"Katz Jonathan","year":"1996","unstructured":"Jonathan Katz , Alfred J Menezes , Paul C Van Oorschot, and Scott A Vanstone . 1996 . Handbook of applied cryptography. CRC press . Jonathan Katz, Alfred J Menezes, Paul C Van Oorschot, and Scott A Vanstone. 1996. Handbook of applied cryptography. CRC press."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Mohsin Khan and Valtteri Niemi. 2017. Concealing IMSI in 5G Network Using Identity Based Encryption. In axXiv preprint arXiv:1708.01868.  Mohsin Khan and Valtteri Niemi. 2017. Concealing IMSI in 5G Network Using Identity Based Encryption. In axXiv preprint arXiv:1708.01868.","DOI":"10.1007\/978-3-319-64701-2_41"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098248"},{"key":"e_1_3_2_1_28_1","volume-title":"Information Technology and Control","volume":"38","author":"Lee Cheng-Chi","year":"2009","unstructured":"Cheng-Chi Lee , I- En Liao , and Min-Shiang Hwang . 2009 . An Extended Certificate-based Authentication and Security Protocol for Mobile Networks . In Information Technology and Control , Vol. 38 . Issue 1. Cheng-Chi Lee, I-En Liao, and Min-Shiang Hwang. 2009. An Extended Certificate-based Authentication and Security Protocol for Mobile Networks. In Information Technology and Control, Vol. 38. Issue 1."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23098"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023662"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 20th USENIX Conference on Security (SEC'11)","author":"Mulliner Collin","year":"2011","unstructured":"Collin Mulliner , Nico Golde , and Jean-Pierre Seifert . 2011 . SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale . In Proceedings of the 20th USENIX Conference on Security (SEC'11) . USENIX Association, Berkeley, CA, USA, 24--24. http:\/\/dl.acm.org\/citation.cfm?id= 2028067.2028091 Collin Mulliner, Nico Golde, and Jean-Pierre Seifert. 2011. SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale. In Proceedings of the 20th USENIX Conference on Security (SEC'11). USENIX Association, Berkeley, CA, USA, 24--24. http:\/\/dl.acm.org\/citation.cfm?id=2028067.2028091"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0027"},{"key":"e_1_3_2_1_33_1","unstructured":"Karsten Nohl. {n. d.}. Mobile Self Defense. https:\/\/events.ccc.de\/congress\/2014\/Fahrplan\/system\/attachments\/2493\/original\/Mobile_Self_Defense-Karsten_Nohl-31C3-v1.pdf  Karsten Nohl. {n. d.}. Mobile Self Defense. https:\/\/events.ccc.de\/congress\/2014\/Fahrplan\/system\/attachments\/2493\/original\/Mobile_Self_Defense-Karsten_Nohl-31C3-v1.pdf"},{"key":"e_1_3_2_1_34_1","unstructured":"Joseph Ooi and Nadia Neninger. 2015. IMSI Catchers and Mobile Security. (2015).  Joseph Ooi and Nadia Neninger. 2015. IMSI Catchers and Mobile Security. (2015)."},{"key":"e_1_3_2_1_35_1","volume-title":"White-Stingray: Evaluating IMSI Catchers Detection Applications. In 11th USENIX Workshop on Offensive Technologies (WOOT 17)","author":"Park Shinjo","year":"2017","unstructured":"Shinjo Park , Altaf Shaik , Ravishankar Borgaonkar , Andrew Martin , and JeanPierre Seifert . 2017 . White-Stingray: Evaluating IMSI Catchers Detection Applications. In 11th USENIX Workshop on Offensive Technologies (WOOT 17) . USENIX Association, Vancouver, BC. https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/park Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Andrew Martin, and JeanPierre Seifert. 2017. White-Stingray: Evaluating IMSI Catchers Detection Applications. In 11th USENIX Workshop on Offensive Technologies (WOOT 17). USENIX Association, Vancouver, BC. https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/park"},{"key":"e_1_3_2_1_36_1","unstructured":"Adrian Perrig Ran Canetti J.D. Tygar and Dawn Song. 2005. The TESLA Broadcast Authentication Protocol. In Cryptobytes 5.  Adrian Perrig Ran Canetti J.D. Tygar and Dawn Song. 2005. The TESLA Broadcast Authentication Protocol. In Cryptobytes 5."},{"key":"e_1_3_2_1_37_1","volume-title":"Wireless Personal Multimedia Communications (WPMC), 2013 16th International Symposium on.","author":"Jover Roger Piqueras","year":"2013","unstructured":"Roger Piqueras Jover . 2013 . Security Attacks Against the Availability of LTE Mobility Networks: Overview and Research Directions . In Wireless Personal Multimedia Communications (WPMC), 2013 16th International Symposium on. Roger Piqueras Jover. 2013. Security Attacks Against the Availability of LTE Mobility Networks: Overview and Research Directions. In Wireless Personal Multimedia Communications (WPMC), 2013 16th International Symposium on."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929820.1929854"},{"key":"e_1_3_2_1_39_1","volume-title":"AuthentiCall: Efficient Identity and Content Authentication for Phone Calls. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Reaves Bradley","year":"2017","unstructured":"Bradley Reaves , Logan Blue , Hadi Abdullah , Luis Vargas , Patrick Traynor , and Thomas Shrimpton . 2017 . AuthentiCall: Efficient Identity and Content Authentication for Phone Calls. In 26th USENIX Security Symposium (USENIX Security 17) . Vancouver, BC, 575--592. Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor, and Thomas Shrimpton. 2017. AuthentiCall: Efficient Identity and Content Authentication for Phone Calls. In 26th USENIX Security Symposium (USENIX Security 17). Vancouver, BC, 575--592."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2820728"},{"key":"e_1_3_2_1_42_1","volume-title":"Breaking LTE on Layer Two. In IEEE Symposium on Security & Privacy (SP). IEEE.","author":"Rupprecht David","year":"2019","unstructured":"David Rupprecht , Katharina Kohls , Thorsten Holz , and Christina P\u00f6pper . 2019 . Breaking LTE on Layer Two. In IEEE Symposium on Security & Privacy (SP). IEEE. David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina P\u00f6pper. 2019. Breaking LTE on Layer Two. In IEEE Symposium on Security & Privacy (SP). IEEE."},{"key":"e_1_3_2_1_43_1","first-page":"1","article-title":"X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP","volume":"6960","author":"Santesson Stefan","year":"2013","unstructured":"Stefan Santesson , Michael Myers , Rich Ankney , Ambarish Malpani , Slava Galperin , and Carlisle Adams . 2013 . X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP . RFC 6960 (2013), 1 -- 41 . Stefan Santesson, Michael Myers, Rich Ankney, Ambarish Malpani, Slava Galperin, and Carlisle Adams. 2013. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. RFC 6960 (2013), 1--41.","journal-title":"RFC"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23236"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653690"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of 16th USENIX Security Symposium. Article 21","author":"Traynor Patrick","year":"2007","unstructured":"Patrick Traynor , Patrick McDaniel , and Thomas La Porta . 2007 . On Attack Causality in Internet-connected Cellular Networks . In Proceedings of 16th USENIX Security Symposium. Article 21 , 16 pages. Patrick Traynor, Patrick McDaniel, and Thomas La Porta. 2007. On Attack Causality in Internet-connected Cellular Networks. In Proceedings of 16th USENIX Security Symposium. Article 21, 16 pages."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813615"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2716911"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2716911"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321387.1321391"},{"key":"e_1_3_2_1_51_1","volume-title":"Mobile Communications","author":"Zheng Yuliang","unstructured":"Yuliang Zheng . 1996. An Authentication and Security Protocol for Mobile Computing . In Mobile Communications . Springer US , 249--267. Yuliang Zheng. 1996. An Authentication and Security Protocol for Mobile Computing. In Mobile Communications. Springer US, 249--267."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196521"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Miami Florida","acronym":"WiSec '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323402","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3323402","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3323402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323402"}},"subtitle":["the root of all evil"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":52,"alternative-id":["10.1145\/3317549.3323402","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3323402","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}