{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:01:52Z","timestamp":1776888112257,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Information and communications Technology Planning and Evaluation","award":["2020-0-00428"],"award-info":[{"award-number":["2020-0-00428"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,29]]},"DOI":"10.1145\/3558482.3590196","type":"proceedings-article","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T16:10:08Z","timestamp":1687968608000},"page":"43-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["LTESniffer: An Open-source LTE Downlink\/Uplink Eavesdropper"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-2229-6533","authenticated-orcid":false,"given":"Tuan Dinh","family":"Hoang","sequence":"first","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5102-2190","authenticated-orcid":false,"given":"CheolJun","family":"Park","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8655-8387","authenticated-orcid":false,"given":"Mincheol","family":"Son","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4726-8433","authenticated-orcid":false,"given":"Taekkyung","family":"Oh","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3845-4060","authenticated-orcid":false,"given":"Sangwook","family":"Bae","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3773-1263","authenticated-orcid":false,"given":"Junho","family":"Ahn","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0692-0899","authenticated-orcid":false,"given":"BeomSeok","family":"Oh","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4879-1262","authenticated-orcid":false,"given":"Yongdae","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Watching the Watchers: Practical Video Identification Attack in LTE Networks. In 31st USENIX Security Symposium","author":"Bae S.","year":"2022","unstructured":"S. Bae , M. Son , D. Kim , C. Park , J. Lee , S. Son , and Y. Kim . Watching the Watchers: Practical Video Identification Attack in LTE Networks. In 31st USENIX Security Symposium , 2022 . S. Bae, M. Son, D. Kim, C. Park, J. Lee, S. Son, and Y. Kim. Watching the Watchers: Practical Video Identification Attack in LTE Networks. In 31st USENIX Security Symposium, 2022."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980055.2980057"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467826"},{"key":"e_1_3_2_1_4_1","unstructured":"Ettus Research USRP X410. https:\/\/www.ettus.com\/all-products\/usrp-x410\/.  Ettus Research USRP X410. https:\/\/www.ettus.com\/all-products\/usrp-x410\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014096"},{"key":"e_1_3_2_1_6_1","volume-title":"GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier. In NDSS Symposium","author":"Hong B.","year":"2018","unstructured":"B. Hong , S. Bae , and Y. Kim . GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier. In NDSS Symposium , 2018 . B. Hong, S. Bae, and Y. Kim. GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier. In NDSS Symposium, 2018."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23442"},{"key":"e_1_3_2_1_8_1","volume-title":"LTE security, protocol exploits and location tracking experimentation with low-cost software radio. arXiv preprint","author":"Jover R. P.","year":"2016","unstructured":"R. P. Jover . LTE security, protocol exploits and location tracking experimentation with low-cost software radio. arXiv preprint , 2016 . R. P. Jover. LTE security, protocol exploits and location tracking experimentation with low-cost software radio. arXiv preprint, 2016."},{"key":"e_1_3_2_1_9_1","unstructured":"Keysight WaveJudge Wireless Analyzer Solutions. https:\/\/www.keysight.com\/us\/ en\/products\/wireless-analyzers\/wavejudge-wireless-analyzer-solutions.html.  Keysight WaveJudge Wireless Analyzer Solutions. https:\/\/www.keysight.com\/us\/ en\/products\/wireless-analyzers\/wavejudge-wireless-analyzer-solutions.html."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323416"},{"key":"e_1_3_2_1_11_1","volume-title":"31st USENIX Security Symposium","author":"Kotuliak M.","year":"2022","unstructured":"M. Kotuliak , S. Erni , P. Leu , M. R\u00f6schlin , and S. ?apkun. L Track : Stealthy tracking of mobile phones in LTE . In 31st USENIX Security Symposium , 2022 . M. Kotuliak, S. Erni, P. Leu, M. R\u00f6schlin, and S. ?apkun. LTrack: Stealthy tracking of mobile phones in LTE. In 31st USENIX Security Symposium, 2022."},{"key":"e_1_3_2_1_12_1","volume-title":"ACM SIGCOMM","author":"Kumar S.","year":"2014","unstructured":"S. Kumar , E. Hamed , D. Katabi , and L. Erran Li . LTE radio analytics made easy and accessible . In ACM SIGCOMM , 2014 . S. Kumar, E. Hamed, D. Katabi, and L. Erran Li. LTE radio analytics made easy and accessible. In ACM SIGCOMM, 2014."},{"key":"e_1_3_2_1_13_1","volume-title":"30th USENIX Security Symposium","author":"Lakshmanan N.","year":"2021","unstructured":"N. Lakshmanan , N. Budhdev , M. S. Kang , M. C. Chan , and J. Han . A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks . In 30th USENIX Security Symposium , 2021 . N. Lakshmanan, N. Budhdev, M. S. Kang, M. C. Chan, and J. Han. A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks. In 30th USENIX Security Symposium, 2021."},{"key":"e_1_3_2_1_14_1","volume-title":"From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers","author":"Ludant N.","year":"2023","unstructured":"N. Ludant , P. Robyns , and G. Noubir . From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers . In IEEE S &P, 2023 . N. Ludant, P. Robyns, and G. Noubir. From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers. In IEEE S&P, 2023."},{"key":"e_1_3_2_1_15_1","volume-title":"Preventing SIM Box Fraud Using Device Model Fingerprinting. In NDSS Symposium","author":"Oh B.","year":"2023","unstructured":"B. Oh , J. Ahn , S. Bae , M. Son , Y. Lee , M. Kang , and Y. Kim . Preventing SIM Box Fraud Using Device Model Fingerprinting. In NDSS Symposium , 2023 . B. Oh, J. Ahn, S. Bae, M. Son, Y. Lee, M. Kang, and Y. Kim. Preventing SIM Box Fraud Using Device Model Fingerprinting. In NDSS Symposium, 2023."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00006"},{"key":"e_1_3_2_1_17_1","volume-title":"29th USENIX Security Symposium","author":"Rupprecht D.","year":"2020","unstructured":"D. Rupprecht , K. Kohls , T. Holz , and C. P\u00f6pper . Call me maybe: Eavesdropping encrypted LTE calls with ReVoLTE . In 29th USENIX Security Symposium , 2020 . D. Rupprecht, K. Kohls, T. Holz, and C. P\u00f6pper. Call me maybe: Eavesdropping encrypted LTE calls with ReVoLTE. In 29th USENIX Security Symposium, 2020."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23236"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3319728"},{"key":"e_1_3_2_1_20_1","unstructured":"Software Radio Systems. Airscope 2019. http:\/\/www.softwareradiosystems.com.  Software Radio Systems. Airscope 2019. http:\/\/www.softwareradiosystems.com."},{"key":"e_1_3_2_1_21_1","volume-title":"srsRAN","author":"Systems Software Radio","year":"2021","unstructured":"Software Radio Systems . srsRAN , 2021 . https:\/\/github.com\/srsran\/srsRAN. Software Radio Systems. srsRAN, 2021. https:\/\/github.com\/srsran\/srsRAN."},{"key":"e_1_3_2_1_22_1","unstructured":"ThinkRF. ThinkRF 2023. https:\/\/thinkrf.com\/.  ThinkRF. ThinkRF 2023. https:\/\/thinkrf.com\/."},{"key":"e_1_3_2_1_23_1","unstructured":"Accuver XCAL 2023. http:\/\/www.accuver.com\/.  Accuver XCAL 2023. http:\/\/www.accuver.com\/."}],"event":{"name":"WiSec '23: 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Guildford United Kingdom","acronym":"WiSec '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558482.3590196","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558482.3590196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:08Z","timestamp":1750178828000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558482.3590196"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,29]]},"references-count":23,"alternative-id":["10.1145\/3558482.3590196","10.1145\/3558482"],"URL":"https:\/\/doi.org\/10.1145\/3558482.3590196","relation":{},"subject":[],"published":{"date-parts":[[2023,5,29]]},"assertion":[{"value":"2023-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}