{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:52:59Z","timestamp":1773330779945,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3324927","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"261-266","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":60,"title":["LTE security disabled"],"prefix":"10.1145","author":[{"given":"Merlin","family":"Chlosta","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"given":"David","family":"Rupprecht","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"given":"Christina","family":"P\u00f6pper","sequence":"additional","affiliation":[{"name":"NYU Abu Dhabi, United Arab Emirates"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"33401","volume-title":"3GPP System Architecture Evolution (SAE)","author":"GPP.","unstructured":"3 GPP. 2011. 3GPP System Architecture Evolution (SAE) ; Security architecture. TS 33.401. http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/ 33401 .htm 3GPP. 2011. 3GPP System Architecture Evolution (SAE); Security architecture. TS 33.401. http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/33401.htm"},{"key":"e_1_3_2_1_2_1","volume-title":"3rd Generation Partnership Project (3GPP)","author":"Evolved Packet GPP.","unstructured":"3 GPP. 2011. Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3. TS 24.301. 3rd Generation Partnership Project (3GPP) . http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/24301.htm 3GPP. 2011. Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3. TS 24.301. 3rd Generation Partnership Project (3GPP). http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/24301.htm"},{"key":"e_1_3_2_1_3_1","volume-title":"C1-191700 - Handling when the UE indicated security capabilities are invalid or unacceptable. https:\/\/portal.3gpp.org\/ngppapp\/CreateTdoc.aspx?mode=view&contributionUid=C1-191700. {Online","author":"GPP.","year":"2019","unstructured":"3 GPP. 2019. C1-191700 - Handling when the UE indicated security capabilities are invalid or unacceptable. https:\/\/portal.3gpp.org\/ngppapp\/CreateTdoc.aspx?mode=view&contributionUid=C1-191700. {Online ; accessed April 8, 2019 }. 3GPP. 2019. C1-191700 - Handling when the UE indicated security capabilities are invalid or unacceptable. https:\/\/portal.3gpp.org\/ngppapp\/CreateTdoc.aspx?mode=view&contributionUid=C1-191700. {Online; accessed April 8, 2019}."},{"key":"e_1_3_2_1_4_1","volume-title":"- Handling when the UE indicated security capabilities are invalid or unacceptable. https:\/\/portal.3gpp.org\/ngppapp\/CreateTdoc.aspx?mode=view&contributionUid=C1-191702. {Online","author":"GPP.","year":"2019","unstructured":"3 GPP. 2019. C1-191702 , - Handling when the UE indicated security capabilities are invalid or unacceptable. https:\/\/portal.3gpp.org\/ngppapp\/CreateTdoc.aspx?mode=view&contributionUid=C1-191702. {Online ; accessed April 8, 2019 }. 3GPP. 2019. C1-191702, - Handling when the UE indicated security capabilities are invalid or unacceptable. https:\/\/portal.3gpp.org\/ngppapp\/CreateTdoc.aspx?mode=view&contributionUid=C1-191702. {Online; accessed April 8, 2019}."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382221"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664272"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Dan Forsberg G\u00fcnther Horn Wolf-Dietrich Moeller and Valtteri Niemi. 2012. LTE Security. John Wiley & Sons.   Dan Forsberg G\u00fcnther Horn Wolf-Dietrich Moeller and Valtteri Niemi. 2012. LTE Security. John Wiley & Sons.","DOI":"10.1002\/9781118380642"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980159.2980163"},{"key":"e_1_3_2_1_9_1","volume-title":"GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier. In Symposium on Network and Distributed System Security (NDSS). ISOC.","author":"Hong Byeongdo","year":"2018","unstructured":"Byeongdo Hong , Sangwook Bae , and Yongdae Kim . 2018 . GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier. In Symposium on Network and Distributed System Security (NDSS). ISOC. Byeongdo Hong, Sangwook Bae, and Yongdae Kim. 2018. GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier. In Symposium on Network and Distributed System Security (NDSS). ISOC."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"B. Hong S. Park H. Kim D. Kim H. Hong H. Choi J. P. Seifert S. J. Lee and Y. Kim. 2018. Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis. IEEE Transactions on Mobile Computing (2018).  B. Hong S. Park H. Kim D. Kim H. Hong H. Choi J. P. Seifert S. J. Lee and Y. Kim. 2018. Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis. IEEE Transactions on Mobile Computing (2018).","DOI":"10.1109\/TMC.2018.2804913"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23313"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23442"},{"key":"e_1_3_2_1_13_1","volume-title":"Security Attacks Against the Availability of LTE Mobility Networks: Overview and Research Directions. In Symposium on Wireless Personal Multimedia Communications (WPMC). IEEE.","author":"Jover Roger Piqueras","year":"2013","unstructured":"Roger Piqueras Jover . 2013 . Security Attacks Against the Availability of LTE Mobility Networks: Overview and Research Directions. In Symposium on Wireless Personal Multimedia Communications (WPMC). IEEE. Roger Piqueras Jover. 2013. Security Attacks Against the Availability of LTE Mobility Networks: Overview and Research Directions. In Symposium on Wireless Personal Multimedia Communications (WPMC). IEEE."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813718"},{"key":"e_1_3_2_1_15_1","volume-title":"Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane. In IEEE Symposium on Security & Privacy (SP). IEEE.","author":"Kim Hongil","year":"2018","unstructured":"Hongil Kim , Jiho Lee , Eunkyu Lee , and Yongdae Kim . 2018 . Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane. In IEEE Symposium on Security & Privacy (SP). IEEE. Hongil Kim, Jiho Lee, Eunkyu Lee, and Yongdae Kim. 2018. Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane. In IEEE Symposium on Security & Privacy (SP). IEEE."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813618"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7452266"},{"key":"e_1_3_2_1_18_1","volume-title":"ANSSI Symposium sur la s\u00e9curit\u00e9 des technologies de l'information et des communications (SSTIC).","author":"Michau Benoit","year":"2016","unstructured":"Benoit Michau and Christophe Devine . 2016 . How to not Break LTE Crypto . In ANSSI Symposium sur la s\u00e9curit\u00e9 des technologies de l'information et des communications (SSTIC). Benoit Michau and Christophe Devine. 2016. How to not Break LTE Crypto. In ANSSI Symposium sur la s\u00e9curit\u00e9 des technologies de l'information et des communications (SSTIC)."},{"key":"e_1_3_2_1_19_1","volume-title":"GSM Roaming and Coverage Maps. https:\/\/maps.mobileworldlive.com\/. {Online","author":"Live Mobile World","year":"2019","unstructured":"Mobile World Live . 2018. GSM Roaming and Coverage Maps. https:\/\/maps.mobileworldlive.com\/. {Online ; accessed April 8, 2019 }. Mobile World Live. 2018. GSM Roaming and Coverage Maps. https:\/\/maps.mobileworldlive.com\/. {Online; accessed April 8, 2019}."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Peter Ney Ian Smith Gabriel Cadamuro and Tadayoshi Kohno. 2017. SeaGlass: Enabling City-wide IMSI-Catcher Detection. In Privacy Enhancing Technologies (PETS). De Gruyter Open.  Peter Ney Ian Smith Gabriel Cadamuro and Tadayoshi Kohno. 2017. SeaGlass: Enabling City-wide IMSI-Catcher Detection. In Privacy Enhancing Technologies (PETS). De Gruyter Open.","DOI":"10.1515\/popets-2017-0027"},{"key":"e_1_3_2_1_21_1","volume-title":"On Security Research towards Future Mobile Network Generations","author":"Rupprecht David","year":"2018","unstructured":"David Rupprecht , Adrian Dabrowski , Thorsten Holz , Edgar Weippl , and Christina P\u00f6pper . 2018. On Security Research towards Future Mobile Network Generations . IEEE Communications Surveys & Tutorials ( 2018 ). David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, and Christina P\u00f6pper. 2018. On Security Research towards Future Mobile Network Generations. IEEE Communications Surveys & Tutorials (2018)."},{"key":"e_1_3_2_1_22_1","volume-title":"Workshop on Offensive Technologies (WOOT). USENIX Association.","author":"Rupprecht David","year":"2016","unstructured":"David Rupprecht , Kai Jansen , and Christina P\u00f6pper . 2016 . Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness . In Workshop on Offensive Technologies (WOOT). USENIX Association. David Rupprecht, Kai Jansen, and Christina P\u00f6pper. 2016. Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness. In Workshop on Offensive Technologies (WOOT). USENIX Association."},{"key":"e_1_3_2_1_23_1","volume-title":"Breaking LTE on Layer Two. In IEEE Symposium on Security & Privacy (SP).","author":"Rupprecht David","year":"2019","unstructured":"David Rupprecht , Katharina Kohls , Thorsten Holz , and Christina P\u00f6pper . 2019 . Breaking LTE on Layer Two. In IEEE Symposium on Security & Privacy (SP). David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina P\u00f6pper. 2019. Breaking LTE on Layer Two. In IEEE Symposium on Security & Privacy (SP)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23236"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Miami Florida","acronym":"WiSec '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3324927","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3324927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3324927"}},"subtitle":["misconfiguration in commercial networks"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":24,"alternative-id":["10.1145\/3317549.3324927","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3324927","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}