{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:53:32Z","timestamp":1756000412288,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek (NWO)","award":["ENCRY.2021.001"],"award-info":[{"award-number":["ENCRY.2021.001"]}]},{"name":"Deutsche Forschungsgemeinschaft (DFG, German Research Foundation)","award":["EXC 2092 CASA ? 390781972"],"award-info":[{"award-number":["EXC 2092 CASA ? 390781972"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,29]]},"DOI":"10.1145\/3558482.3581777","type":"proceedings-article","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T16:10:08Z","timestamp":1687968608000},"page":"145-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8520-9601","authenticated-orcid":false,"given":"Thijs","family":"Heijligenberg","sequence":"first","affiliation":[{"name":"Radboud University, Nijmegen, GA, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5108-3916","authenticated-orcid":false,"given":"Guido","family":"Knips","sequence":"additional","affiliation":[{"name":"Radboud University, Nijmegen, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2227-1138","authenticated-orcid":false,"given":"Christian","family":"B\u00f6hm","sequence":"additional","affiliation":[{"name":"Ruhr University, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5880-013X","authenticated-orcid":false,"given":"David","family":"Rupprecht","sequence":"additional","affiliation":[{"name":"Radix Security, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5656-7116","authenticated-orcid":false,"given":"Katharina","family":"Kohls","sequence":"additional","affiliation":[{"name":"Radboud University, Nijmegen, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2023,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. 3GPP_TSG_RAN@LIST.ETSI.ORG archive Subject: Re: [Integrity_protection] Final decision on RP-200505.  2020. 3GPP_TSG_RAN@LIST.ETSI.ORG archive Subject: Re: [Integrity_protection] Final decision on RP-200505."},{"key":"e_1_3_2_1_2_1","first-page":"401","article-title":"3GPP System Architecture Evolution (SAE); Security architecture","volume":"33","author":"GPP.","year":"2021","unstructured":"3 GPP. 2021 . 3GPP System Architecture Evolution (SAE); Security architecture . Technical Specification (TS) 33 . 401 . 3rd Generation Partnership Project (3GPP). http:\/\/www.3gpp.org\/DynaReport\/33401.htm Version 17.0.0. 3GPP. 2021. 3GPP System Architecture Evolution (SAE); Security architecture. Technical Specification (TS) 33.401. 3rd Generation Partnership Project (3GPP). http:\/\/www.3gpp.org\/DynaReport\/33401.htm Version 17.0.0.","journal-title":"Technical Specification (TS)"},{"key":"e_1_3_2_1_3_1","first-page":"323","article-title":"NR; Packet Data Convergence Protocol (PDCP) specification","volume":"38","author":"GPP.","year":"2021","unstructured":"3 GPP. 2021 . NR; Packet Data Convergence Protocol (PDCP) specification . Technical Specification (TS) 38 . 323 . 3rd Generation Partnership Project (3GPP). http: \/\/www.3gpp.org\/DynaReport\/38323.htm Version 16.6.0. 3GPP. 2021. NR; Packet Data Convergence Protocol (PDCP) specification. Technical Specification (TS) 38.323. 3rd Generation Partnership Project (3GPP). http: \/\/www.3gpp.org\/DynaReport\/38323.htm Version 16.6.0.","journal-title":"Technical Specification (TS)"},{"key":"e_1_3_2_1_4_1","first-page":"501","article-title":"Security architecture and procedures for 5G System","volume":"33","author":"GPP.","year":"2022","unstructured":"3 GPP. 2022 . Security architecture and procedures for 5G System . Technical Specification (TS) 33 . 501 . 3rd Generation Partnership Project (3GPP). http: \/\/www.3gpp.org\/DynaReport\/33501.htm Version 17.4.1. 3GPP. 2022. Security architecture and procedures for 5G System. Technical Specification (TS) 33.501. 3rd Generation Partnership Project (3GPP). http: \/\/www.3gpp.org\/DynaReport\/33501.htm Version 17.4.1.","journal-title":"Technical Specification (TS)"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIEA.2010.5679375"},{"volume-title":"Annual international cryptology conference","author":"Barkan Elad","key":"e_1_3_2_1_6_1","unstructured":"Elad Barkan , Eli Biham , and Nathan Keller . 2003. Instant ciphertext-only cryptanalysis of GSM encrypted communication . In Annual international cryptology conference . Springer , 600--616. Elad Barkan, Eli Biham, and Nathan Keller. 2003. Instant ciphertext-only cryptanalysis of GSM encrypted communication. In Annual international cryptology conference. Springer, 600--616."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_24"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Morris J Dworkin etal 2016. Recommendation for block cipher modes of operation: The CMAC mode for authentication. (2016).  Morris J Dworkin et al. 2016. Recommendation for block cipher modes of operation: The CMAC mode for authentication. (2016).","DOI":"10.6028\/NIST.SP.800-38b"},{"key":"e_1_3_2_1_10_1","unstructured":"Patrik Ekdahl Thomas Johansson Alexander Maximov and Jing Yang. [n. d.]. A new SNOW stream cipher called SNOW-V. Transactions on Symmetric Cryptology ([n. d.]).  Patrik Ekdahl Thomas Johansson Alexander Maximov and Jing Yang. [n. d.]. A new SNOW stream cipher called SNOW-V. Transactions on Symmetric Cryptology ([n. d.])."},{"key":"e_1_3_2_1_11_1","unstructured":"ETSI\/SAGE. [n. d.]. Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 UIA2. Document 1: UEA2 and UIA2 Specification. https: \/\/www.gsma.com\/security\/wp-content\/uploads\/2019\/05\/uea2uia2d1v21.pdf.  ETSI\/SAGE. [n. d.]. Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 UIA2. Document 1: UEA2 and UIA2 Specification. https: \/\/www.gsma.com\/security\/wp-content\/uploads\/2019\/05\/uea2uia2d1v21.pdf."},{"key":"e_1_3_2_1_12_1","unstructured":"El Hajj Ghizlane Orhanou. [n. d.]. The New LTE Cryptographic Algorithms EEA3 and EIA3. http:\/\/www.naturalspublishing.com\/files\/published\/zf215q192wiz2s. pdf.  El Hajj Ghizlane Orhanou. [n. d.]. The New LTE Cryptographic Algorithms EEA3 and EIA3. http:\/\/www.naturalspublishing.com\/files\/published\/zf215q192wiz2s. pdf."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980159.2980163"},{"key":"e_1_3_2_1_14_1","unstructured":"ITU. 2021. Detailed specifications of the terrestrial radio interfaces of International Mobile Telecommunications-2020 M.2150-0.  ITU. 2021. Detailed specifications of the terrestrial radio interfaces of International Mobile Telecommunications-2020 M.2150-0."},{"key":"e_1_3_2_1_15_1","volume-title":"Conference on Very Large Scale Integration (VLSI-SOC '08)","author":"Kitsos Paris","year":"2008","unstructured":"Paris Kitsos , George Selimis , and Odysseas Koufopavlou . 2008 . High performance ASIC implementation of the SNOW 3G Stream Cipher . In Conference on Very Large Scale Integration (VLSI-SOC '08) . Paris Kitsos, George Selimis, and Odysseas Koufopavlou. 2008. High performance ASIC implementation of the SNOW 3G Stream Cipher. In Conference on Very Large Scale Integration (VLSI-SOC '08)."},{"key":"e_1_3_2_1_16_1","unstructured":"Paris Kitsos Nicolas Sklavos George Provelengios and Athanassios N. Skodras. [n. d.]. FPGA-based performance analysis of stream ciphers ZUC Snow3g Grain V1 Mickey V2 Trivium and E0. Microprocessors and Microsystems ([n. d.]).  Paris Kitsos Nicolas Sklavos George Provelengios and Athanassios N. Skodras. [n. d.]. FPGA-based performance analysis of stream ciphers ZUC Snow3g Grain V1 Mickey V2 Trivium and E0. Microprocessors and Microsystems ([n. d.])."},{"key":"e_1_3_2_1_17_1","volume-title":"International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 51--64","author":"Kuo Henry","year":"2001","unstructured":"Henry Kuo and Ingrid Verbauwhede . 2001 . Architectural optimization for a 1.82 Gbits\/sec VLSI implementation of the AES Rijndael algorithm . In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 51--64 . Henry Kuo and Ingrid Verbauwhede. 2001. Architectural optimization for a 1.82 Gbits\/sec VLSI implementation of the AES Rijndael algorithm. In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 51--64."},{"key":"e_1_3_2_1_18_1","unstructured":"Reiner Ludwig. 2022. Who cares about latency in 5G? https:\/\/www.ericsson. com\/en\/blog\/2022\/8\/who-cares-about-latency-in-5g  Reiner Ludwig. 2022. Who cares about latency in 5G? https:\/\/www.ericsson. com\/en\/blog\/2022\/8\/who-cares-about-latency-in-5g"},{"key":"e_1_3_2_1_19_1","volume-title":"Breaking LTE on Layer Two. In IEEE Symposium on Security & Privacy (SP). IEEE.","author":"Rupprecht David","year":"2019","unstructured":"David Rupprecht , Katharina Kohls , Thorsten Holz , and Christina P\u00f6pper . 2019 . Breaking LTE on Layer Two. In IEEE Symposium on Security & Privacy (SP). IEEE. David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina P\u00f6pper. 2019. Breaking LTE on Layer Two. In IEEE Symposium on Security & Privacy (SP). IEEE."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"David Rupprecht Katharina Kohls Thorsten Holz and Christina P\u00f6pper. 2020. IMP4GT: IMPersonation Attacks in 4G NeTworks.  David Rupprecht Katharina Kohls Thorsten Holz and Christina P\u00f6pper. 2020. IMP4GT: IMPersonation Attacks in 4G NeTworks.","DOI":"10.14722\/ndss.2020.24283"}],"event":{"name":"WiSec '23: 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Guildford United Kingdom","acronym":"WiSec '23"},"container-title":["Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558482.3581777","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558482.3581777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:07Z","timestamp":1750178827000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558482.3581777"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,29]]},"references-count":19,"alternative-id":["10.1145\/3558482.3581777","10.1145\/3558482"],"URL":"https:\/\/doi.org\/10.1145\/3558482.3581777","relation":{},"subject":[],"published":{"date-parts":[[2023,5,29]]},"assertion":[{"value":"2023-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}