{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:27:39Z","timestamp":1773840459509,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3507657.3528559","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T11:30:36Z","timestamp":1651923036000},"page":"169-174","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Measuring the Deployment of 5G Security Enhancement"],"prefix":"10.1145","author":[{"given":"Shiyue","family":"Nie","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Yiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Tao","family":"Wan","sequence":"additional","affiliation":[{"name":"CableLabs &amp; Carleton University, Ottawa, Canada"}]},{"given":"Haixin","family":"Duan","sequence":"additional","affiliation":[{"name":"Tsinghua University &amp; QI-ANXIN Technology Research Institute, Beijing, China"}]},{"given":"Song","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijjing, China"}]}],"member":"320","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"501","article-title":"Security architecture and procedures for 5G System","volume":"33","author":"GPP.","year":"2022","unstructured":"3 GPP. 2022 . Security architecture and procedures for 5G System . Technical Standard (TS) 33 . 501 . 3rd Generation Partnership Project (3GPP). Version 16.9.0. 3GPP. 2022. Security architecture and procedures for 5G System. Technical Standard (TS) 33.501. 3rd Generation Partnership Project (3GPP). Version 16.9.0.","journal-title":"Technical Standard (TS)"},{"key":"e_1_3_2_1_2_1","volume-title":"The Mobile Economy","author":"GSM Association","year":"2021","unstructured":"GSM Association . [n.d.]. The Mobile Economy 2021 . https:\/\/www.gsma.com\/mobileeconomy\/wp-content\/uploads\/2021\/07\/GSMA_MobileEconomy2021_3.pdf. GSM Association. [n.d.]. The Mobile Economy 2021. https:\/\/www.gsma.com\/mobileeconomy\/wp-content\/uploads\/2021\/07\/GSMA_MobileEconomy2021_3.pdf."},{"key":"e_1_3_2_1_3_1","volume-title":"Formal Analysis of 5G Authentication. CoRR abs\/1806.10360","author":"Basin David A.","year":"2018","unstructured":"David A. Basin , Jannik Dreier , Lucca Hirschi , Sasa Radomirovic , Ralf Sasse , and Vincent Stettler . 2018. Formal Analysis of 5G Authentication. CoRR abs\/1806.10360 ( 2018 ). arXiv:1806.10360 http:\/\/arxiv.org\/abs\/1806.10360 David A. Basin, Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse, and Vincent Stettler. 2018. Formal Analysis of 5G Authentication. CoRR abs\/1806.10360 (2018). arXiv:1806.10360 http:\/\/arxiv.org\/abs\/1806.10360"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3324927"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467826"},{"key":"e_1_3_2_1_6_1","unstructured":"Ltd. DingLi Corp. [n.d.]. Pilot Pioneer - The specialized field test solution for directed radio access network troubleshooting and optimization. https:\/\/www.dingli.com\/ PilotPioneer.php  Ltd. DingLi Corp. [n.d.]. Pilot Pioneer - The specialized field test solution for directed radio access network troubleshooting and optimization. https:\/\/www.dingli.com\/ PilotPioneer.php"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Byeongdo Hong Sangwook Bae and Yongdae Kim. 2018. GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier.. In NDSS.  Byeongdo Hong Sangwook Bae and Yongdae Kim. 2018. GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier.. In NDSS.","DOI":"10.14722\/ndss.2018.23349"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937997"},{"key":"e_1_3_2_1_9_1","volume-title":"HITB AMS Security Conference.","author":"Huang Lin","year":"2016","unstructured":"Lin Huang . 2016 . Forcing Targeted LTE Cellphone into Unsafe Network . In HITB AMS Security Conference. Lin Huang. 2016. Forcing Targeted LTE Cellphone into Unsafe Network. In HITB AMS Security Conference."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23313"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102537"},{"key":"e_1_3_2_1_12_1","volume-title":"Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane. In 2019 IEEE Symposium on Security and Privacy (SP). 1153--1168","author":"Kim Hongil","year":"2019","unstructured":"Hongil Kim , Jiho Lee , Eunkyu Lee , and Yongdae Kim . 2019 . Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane. In 2019 IEEE Symposium on Security and Privacy (SP). 1153--1168 . https:\/\/doi.org\/10.1109\/SP.2019.00038 10.1109\/SP.2019.00038 Hongil Kim, Jiho Lee, Eunkyu Lee, and Yongdae Kim. 2019. Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane. In 2019 IEEE Symposium on Security and Privacy (SP). 1153--1168. https:\/\/doi.org\/10.1109\/SP.2019.00038"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323416"},{"key":"e_1_3_2_1_14_1","series-title":"Feb 2012","volume-title":"Location leaks on the GSM air interface. ISOC NDSS","author":"Kune Denis Foo","year":"2012","unstructured":"Denis Foo Kune , John Koelndorfer , Nicholas Hopper , and Yongdae Kim . 2012. Location leaks on the GSM air interface. ISOC NDSS ( Feb 2012 ) ( 2012 ). Denis Foo Kune, John Koelndorfer, Nicholas Hopper, and Yongdae Kim. 2012. Location leaks on the GSM air interface. ISOC NDSS (Feb 2012) (2012)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65127-9_19"},{"key":"e_1_3_2_1_16_1","volume-title":"10th USENIXWorkshop on Offensive Technologies (WOOT 16)","author":"Rupprecht David","unstructured":"David Rupprecht , Kai Jansen , and Christina P\u00f6pper . 2016. Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness . In 10th USENIXWorkshop on Offensive Technologies (WOOT 16) . USENIX Association , Austin, TX . https:\/\/www.usenix.org\/conference\/woot16\/workshop-program\/presentation\/rupprecht David Rupprecht, Kai Jansen, and Christina P\u00f6pper. 2016. Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness. In 10th USENIXWorkshop on Offensive Technologies (WOOT 16). USENIX Association, Austin, TX. https:\/\/www.usenix.org\/conference\/woot16\/workshop-program\/presentation\/rupprecht"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"David Rupprecht Katharina Kohls Thorsten Holz and Christina P\u00f6pper. 2020. IMP4GT: IMPersonation Attacks in 4G NeTworks.. In NDSS.  David Rupprecht Katharina Kohls Thorsten Holz and Christina P\u00f6pper. 2020. IMP4GT: IMPersonation Attacks in 4G NeTworks.. In NDSS.","DOI":"10.14722\/ndss.2020.24283"},{"key":"e_1_3_2_1_18_1","volume-title":"Breaking LTE on Layer Two. In 2019 IEEE Symposium on Security and Privacy (SP). 1121--1136","author":"Rupprecht David","year":"2019","unstructured":"David Rupprecht , Katharina Kohls , Thorsten Holz , and Christina P\u00f6pper . 2019 . Breaking LTE on Layer Two. In 2019 IEEE Symposium on Security and Privacy (SP). 1121--1136 . https:\/\/doi.org\/10.1109\/SP.2019.00006 10.1109\/SP.2019.00006 David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina P\u00f6pper. 2019. Breaking LTE on Layer Two. In 2019 IEEE Symposium on Security and Privacy (SP). 1121--1136. https:\/\/doi.org\/10.1109\/SP.2019.00006"},{"key":"e_1_3_2_1_19_1","volume-title":"Practical attacks against privacy and availability in 4G\/LTE mobile communication systems. CoRR abs\/1510.07563","author":"Shaik Altaf","year":"2015","unstructured":"Altaf Shaik , Ravishankar Borgaonkar , N. Asokan , Valtteri Niemi , and Jean-Pierre Seifert . 2015. Practical attacks against privacy and availability in 4G\/LTE mobile communication systems. CoRR abs\/1510.07563 ( 2015 ). arXiv:1510.07563 http:\/\/arxiv.org\/abs\/1510.07563 Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, and Jean-Pierre Seifert. 2015. Practical attacks against privacy and availability in 4G\/LTE mobile communication systems. CoRR abs\/1510.07563 (2015). arXiv:1510.07563 http:\/\/arxiv.org\/abs\/1510.07563"},{"key":"#cr-split#-e_1_3_2_1_20_1.1","doi-asserted-by":"crossref","unstructured":"Vui Huang Tea. 2020. Unmasking Concealed 5G Privacy Identity with Machine Learning and GPU in 12 mins. https:\/\/doi.org\/10.36227\/techrxiv.13187636.v1 10.36227\/techrxiv.13187636.v1","DOI":"10.36227\/techrxiv.13187636.v1"},{"key":"#cr-split#-e_1_3_2_1_20_1.2","doi-asserted-by":"crossref","unstructured":"Vui Huang Tea. 2020. Unmasking Concealed 5G Privacy Identity with Machine Learning and GPU in 12 mins. https:\/\/doi.org\/10.36227\/techrxiv.13187636.v1","DOI":"10.36227\/techrxiv.13187636.v1"},{"key":"e_1_3_2_1_21_1","unstructured":"Juan Pedro Tom\u00e1s. [n.d.]. China reaches over 1.3 million 5G base stations nationwide: Report. https:\/\/www.rcrwireless.com\/20211227\/5g\/china-reaches-overmillion-5g-base-stations-nationwide-report  Juan Pedro Tom\u00e1s. [n.d.]. China reaches over 1.3 million 5G base stations nationwide: Report. https:\/\/www.rcrwireless.com\/20211227\/5g\/china-reaches-overmillion-5g-base-stations-nationwide-report"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346856"},{"key":"e_1_3_2_1_23_1","volume-title":"Lte phone number catcher: A practical attack against mobile privacy. Security and Communication Networks 2019","author":"Yu Chuan","year":"2019","unstructured":"Chuan Yu , Shuhui Chen , and Zhiping Cai . 2019. Lte phone number catcher: A practical attack against mobile privacy. Security and Communication Networks 2019 ( 2019 ). Chuan Yu, Shuhui Chen, and Zhiping Cai. 2019. Lte phone number catcher: A practical attack against mobile privacy. Security and Communication Networks 2019 (2019)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108532"},{"key":"e_1_3_2_1_25_1","first-page":"1","article-title":"Formal Analysis of 5G EAP-TLS Authentication Protocol Using ProVerif","volume":"99","author":"Zhang J.","year":"2020","unstructured":"J. Zhang , L. Yang , W. Cao , and Q. Wang . 2020 . Formal Analysis of 5G EAP-TLS Authentication Protocol Using ProVerif . IEEE Access PP , 99 (2020), 1 -- 1 . J. Zhang, L. Yang, W. Cao, and Q. Wang. 2020. Formal Analysis of 5G EAP-TLS Authentication Protocol Using ProVerif. IEEE Access PP, 99 (2020), 1--1.","journal-title":"IEEE Access PP"}],"event":{"name":"WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"San Antonio TX USA","acronym":"WiSec '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528559","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:15Z","timestamp":1750183815000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528559"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":26,"alternative-id":["10.1145\/3507657.3528559","10.1145\/3507657"],"URL":"https:\/\/doi.org\/10.1145\/3507657.3528559","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}