{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:08:54Z","timestamp":1750219734233,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,18]]},"DOI":"10.1145\/3581791.3596846","type":"proceedings-article","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T17:52:21Z","timestamp":1686937941000},"page":"410-422","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["LeopardSeal: Detecting Call Interception via Audio Rogue Base Stations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-2109-3429","authenticated-orcid":false,"given":"Christian","family":"Peeters","sequence":"first","affiliation":[{"name":"Florida Institute for Cybersecurity Research, University of Florida, Gainesville, Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0672-9479","authenticated-orcid":false,"given":"Tyler","family":"Tucker","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity Research, University of Florida, Gainesville, Florida, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7992-0599","authenticated-orcid":false,"given":"Anushri","family":"Jain","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity Research, University of Florida, Gainesville, Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7498-4239","authenticated-orcid":false,"given":"Kevin","family":"Butler","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity Research, University of Florida, Gainesville, Florida, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7143-5189","authenticated-orcid":false,"given":"Patrick","family":"Traynor","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity Research, University of Florida, Gainesville, Florida, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"235","article-title":"Specification of Dual Tone Multi-Frequency (DTMF) Transmitters and Receivers; Part 2","volume":"201","year":"2000","unstructured":"2000 . Specification of Dual Tone Multi-Frequency (DTMF) Transmitters and Receivers; Part 2 : Transmitters. Technical Report ES 201 235 - 232 . European Telecommunications Standards Institute (ETSI). 2000. Specification of Dual Tone Multi-Frequency (DTMF) Transmitters and Receivers; Part 2: Transmitters. Technical Report ES 201 235-2. European Telecommunications Standards Institute (ETSI).","journal-title":"Transmitters. Technical Report ES"},{"volume-title":"Technical Report ETSI TR 101 943 V2.2.1","author":"Generic Network Architecture Lawful Interception","key":"e_1_3_2_1_3_1","unstructured":"2006. Lawful Interception (LI); Concepts of Interception in a Generic Network Architecture . Technical Report ETSI TR 101 943 V2.2.1 . European Telecommunications Standards Institute (ETSI) . 2006. Lawful Interception (LI); Concepts of Interception in a Generic Network Architecture. Technical Report ETSI TR 101 943 V2.2.1. European Telecommunications Standards Institute (ETSI)."},{"key":"e_1_3_2_1_4_1","unstructured":"2016. Building Your Own Rouge GSM Basestation with a BladeRF. (2016). https:\/\/www.rtl-sdr.com\/building-your-own-rogue-gsm-basestation-with-a-bladerf\/  2016. Building Your Own Rouge GSM Basestation with a BladeRF. (2016). https:\/\/www.rtl-sdr.com\/building-your-own-rogue-gsm-basestation-with-a-bladerf\/"},{"key":"e_1_3_2_1_6_1","unstructured":"2016. How to Build Your Own Rogue GSM BTS for Fun and Profit. (2016). https:\/\/www.evilsocket.net\/2016\/03\/31\/How-To-Build-Your-Own-Rogue-GSM-BTS-For-Fun-And-Profit\/  2016. How to Build Your Own Rogue GSM BTS for Fun and Profit. (2016). https:\/\/www.evilsocket.net\/2016\/03\/31\/How-To-Build-Your-Own-Rogue-GSM-BTS-For-Fun-And-Profit\/"},{"volume-title":"A Comparative Introduction to 4G and 5G Authentication. Informed Insights by CableLabs","year":"2019","key":"e_1_3_2_1_7_1","unstructured":"2019. A Comparative Introduction to 4G and 5G Authentication. Informed Insights by CableLabs ( 2019 ). https:\/\/www.cablelabs.com\/insights\/a-comparative-introduction-to-4g-and-5g-authentication 2019. A Comparative Introduction to 4G and 5G Authentication. Informed Insights by CableLabs (2019). https:\/\/www.cablelabs.com\/insights\/a-comparative-introduction-to-4g-and-5g-authentication"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"2021. Best Price GoIP 1 Port IMSI Catcher SIM Server GSM Gateway with IMEI Change Low Cost IMSI Catcher. https:\/\/www.alibaba.com\/product-detail\/best-price-goip-1-port-imsi_60559890007.html  2021. Best Price GoIP 1 Port IMSI Catcher SIM Server GSM Gateway with IMEI Change Low Cost IMSI Catcher. https:\/\/www.alibaba.com\/product-detail\/best-price-goip-1-port-imsi_60559890007.html","DOI":"10.1155\/2021\/8847803"},{"key":"e_1_3_2_1_9_1","unstructured":"2021. bladeRF x40. https:\/\/www.nuand.com\/product\/bladerf-x40\/  2021. bladeRF x40. https:\/\/www.nuand.com\/product\/bladerf-x40\/"},{"volume-title":"Shenzhen Hybertone Technology Co","key":"e_1_3_2_1_10_1","unstructured":"2021. Shenzhen Hybertone Technology Co ., Ltd . http:\/\/www.hybertone.com\/en\/pro_detail.asp?proid=10 2021. Shenzhen Hybertone Technology Co., Ltd. http:\/\/www.hybertone.com\/en\/pro_detail.asp?proid=10"},{"key":"e_1_3_2_1_11_1","unstructured":"2021. Stingray Phone Tracker. https:\/\/en.wikipedia.org\/w\/index.php?title=Stingray_phone_tracker&oldid=1011185824  2021. Stingray Phone Tracker. https:\/\/en.wikipedia.org\/w\/index.php?title=Stingray_phone_tracker&oldid=1011185824"},{"key":"e_1_3_2_1_12_1","unstructured":"2021. Sysmocom Site - sysmoUSIM-SJS1 SIM + USIM Card (10-Pack). http:\/\/shop.sysmocom.de\/products\/sysmousim-sjs1  2021. Sysmocom Site - sysmoUSIM-SJS1 SIM + USIM Card (10-Pack). http:\/\/shop.sysmocom.de\/products\/sysmousim-sjs1"},{"key":"e_1_3_2_1_13_1","unstructured":"2021. Xcell. 4G (LTE) Direct Interception System (Without Downgrading to 3G or 2G). https:\/\/www.discoverytelecom.eu\/catalog\/5438.html  2021. Xcell. 4G (LTE) Direct Interception System (Without Downgrading to 3G or 2G). https:\/\/www.discoverytelecom.eu\/catalog\/5438.html"},{"key":"e_1_3_2_1_14_1","unstructured":"2021. YateBTS - LTE & GSM Mobile Network Components for MNO & MVNO. https:\/\/yatebts.com\/  2021. YateBTS - LTE & GSM Mobile Network Components for MNO & MVNO. https:\/\/yatebts.com\/"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2575828"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264628"},{"key":"e_1_3_2_1_17_1","volume-title":"Long-Secret Stingray Manuals Detail How Police Can Spy on Phones. The Intercept","author":"Biddle Sam","year":"2016","unstructured":"Sam Biddle . 2016. Long-Secret Stingray Manuals Detail How Police Can Spy on Phones. The Intercept ( 2016 ). https:\/\/theintercept.com\/2016\/09\/12\/long-secret-stingray-manuals-detail-how-police-can-spy-on-phones\/ Sam Biddle. 2016. Long-Secret Stingray Manuals Detail How Police Can Spy on Phones. The Intercept (2016). https:\/\/theintercept.com\/2016\/09\/12\/long-secret-stingray-manuals-detail-how-police-can-spy-on-phones\/"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0039"},{"key":"e_1_3_2_1_19_1","volume-title":"Catching IMSI-Catcher-Catchers: An Effectiveness Review of IMSI-Catcher-Catcher Applications. Bachelor Thesis","author":"Brenninkmeijer Bauke","year":"2016","unstructured":"Bauke Brenninkmeijer . 2016. Catching IMSI-Catcher-Catchers: An Effectiveness Review of IMSI-Catcher-Catcher Applications. Bachelor Thesis , Radboud University (Nijmegen , The Netherlands ) ( 2016 ). Bauke Brenninkmeijer. 2016. Catching IMSI-Catcher-Catchers: An Effectiveness Review of IMSI-Catcher-Catcher Applications. Bachelor Thesis, Radboud University (Nijmegen, The Netherlands) (2016)."},{"key":"e_1_3_2_1_20_1","unstructured":"Richard Chirgwin. 2018. Now You Too Can Snoop on Mobe Users from 3G to 5G with a Raspberry Pi and \u20ac1 100 of Gizmos. (2018). https:\/\/www.theregister.com\/2018\/12\/05\/mobile_users_can_be_tracked_with_cheap_kit_aka_protocol\/  Richard Chirgwin. 2018. Now You Too Can Snoop on Mobe Users from 3G to 5G with a Raspberry Pi and \u20ac1 100 of Gizmos. (2018). https:\/\/www.theregister.com\/2018\/12\/05\/mobile_users_can_be_tracked_with_cheap_kit_aka_protocol\/"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Chothia Tom","year":"2018","unstructured":"Tom Chothia , Joeri De Ruiter , and Ben Smyth . 2018 . Modelling and Analysis of a Hierarchy of Distance Bounding Attacks . In Proceedings of the USENIX Security Symposium. Tom Chothia, Joeri De Ruiter, and Ben Smyth. 2018. Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11964254_9"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23394"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.17"},{"volume-title":"Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses (RAID).","author":"Dabrowski Adrian","key":"e_1_3_2_1_25_1","unstructured":"Adrian Dabrowski , Georg Petzl , and Edgar R. Weippl . 2016. The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection . In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses (RAID). Adrian Dabrowski, Georg Petzl, and Edgar R. Weippl. 2016. The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection. In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses (RAID)."},{"volume-title":"Proceedings of the Annual Computer Security Applications Conference (ACSAC).","author":"Dabrowski Adrian","key":"e_1_3_2_1_26_1","unstructured":"Adrian Dabrowski , Nicola Pianta , Thomas Klepp , Martin Mulazzani , and Edgar R. Weippl . 2014. IMSI-Catch Me If You Can: IMSI-Catcher-Catchers . In Proceedings of the Annual Computer Security Applications Conference (ACSAC). Adrian Dabrowski, Nicola Pianta, Thomas Klepp, Martin Mulazzani, and Edgar R. Weippl. 2014. IMSI-Catch Me If You Can: IMSI-Catcher-Catchers. In Proceedings of the Annual Computer Security Applications Conference (ACSAC)."},{"key":"e_1_3_2_1_27_1","volume-title":"Security Vulnerability in 5G-AKA Draft. Department of Computer Science","author":"Dehnel-Wild Martin","year":"2018","unstructured":"Martin Dehnel-Wild and Cas Cremers . 2018. Security Vulnerability in 5G-AKA Draft. Department of Computer Science , University of Oxford , Tech. Rep ( 2018 ), 14--37. Martin Dehnel-Wild and Cas Cremers. 2018. Security Vulnerability in 5G-AKA Draft. Department of Computer Science, University of Oxford, Tech. Rep (2018), 14--37."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the International Conference on Soft Computing in Data Science (SCDS).","author":"Do Thanh Van","year":"2015","unstructured":"Thanh Van Do , Hai Thanh Nguyen , Nikolov Momchil , and Van Thuan Do . 2015 . Detecting IMSI-Catcher Using Soft Computing . In Proceedings of the International Conference on Soft Computing in Data Science (SCDS). Thanh Van Do, Hai Thanh Nguyen, Nikolov Momchil, and Van Thuan Do. 2015. Detecting IMSI-Catcher Using Soft Computing. In Proceedings of the International Conference on Soft Computing in Data Science (SCDS)."},{"volume-title":"Proceedings of the USENIX Security Symposium.","author":"Drimer Saar","key":"e_1_3_2_1_29_1","unstructured":"Saar Drimer and Steven J. Murdoch . 2007. Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks . In Proceedings of the USENIX Security Symposium. Saar Drimer and Steven J. Murdoch. 2007. Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_30_1","volume-title":"Key Evidence in City Murder Case Tossed Due to Stingray Use. The Baltimore Sun","author":"Fenton Justin","year":"2016","unstructured":"Justin Fenton . 2016. Key Evidence in City Murder Case Tossed Due to Stingray Use. The Baltimore Sun ( 2016 ). https:\/\/www.baltimoresun.com\/news\/crime\/bs-md-ci-stingray-murder-evidence-suppressed-20160425-story.html Justin Fenton. 2016. Key Evidence in City Murder Case Tossed Due to Stingray Use. The Baltimore Sun (2016). https:\/\/www.baltimoresun.com\/news\/crime\/bs-md-ci-stingray-murder-evidence-suppressed-20160425-story.html"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"e_1_3_2_1_32_1","unstructured":"Grant Hernandez and Tyler Tucker. 2020. Creating a Cellular Testbed with YateBTS and srsLTE. (2020). https:\/\/hernan.de\/blog\/creating-a-cellular-testbed-with-yatebts-and-srslte\/  Grant Hernandez and Tyler Tucker. 2020. Creating a Cellular Testbed with YateBTS and srsLTE. (2020). https:\/\/hernan.de\/blog\/creating-a-cellular-testbed-with-yatebts-and-srslte\/"},{"key":"e_1_3_2_1_33_1","volume-title":"How to Block StingRay Surveillance in 2022 in 2G, 3G, 4G & 5G Networks. Cloudwards","author":"Hougen Aleksander","year":"2022","unstructured":"Aleksander Hougen . 2022. How to Block StingRay Surveillance in 2022 in 2G, 3G, 4G & 5G Networks. Cloudwards ( 2022 ). https:\/\/www.cloudwards.net\/how-to-block-stingray-surveillance\/ Aleksander Hougen. 2022. How to Block StingRay Surveillance in 2022 in 2G, 3G, 4G & 5G Networks. Cloudwards (2022). https:\/\/www.cloudwards.net\/how-to-block-stingray-surveillance\/"},{"key":"e_1_3_2_1_34_1","volume-title":"Appeals Court Rules.","author":"Jackman Tom","year":"2017","unstructured":"Tom Jackman . 2017. Police Use of 'StingRay' Cellphone Tracker Requires Search Warrant , Appeals Court Rules. ( 2017 ). https:\/\/www.washingtonpost.com\/news\/true-crime\/wp\/2017\/09\/21\/police-use-of-stingray-cellphone-tracker-requires-search-warrant-appeals-court-rules\/ Tom Jackman. 2017. Police Use of 'StingRay' Cellphone Tracker Requires Search Warrant, Appeals Court Rules. (2017). https:\/\/www.washingtonpost.com\/news\/true-crime\/wp\/2017\/09\/21\/police-use-of-stingray-cellphone-tracker-requires-search-warrant-appeals-court-rules\/"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the International Conference on Communication Technologies (ComTech).","author":"Awais Javed M","year":"2019","unstructured":"M Awais Javed and Sohaib khan Niazi . 2019 . 5G Security Artifacts (DoS\/DDoS and Authentication) . In Proceedings of the International Conference on Communication Technologies (ComTech). M Awais Javed and Sohaib khan Niazi. 2019. 5G Security Artifacts (DoS\/DDoS and Authentication). In Proceedings of the International Conference on Communication Technologies (ComTech)."},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the IEEE International Conference on Communications.","author":"Jiang Wenyu","year":"2003","unstructured":"Wenyu Jiang , Kazuumi Koguchi , and Henning Schulzrinne . 2003 . QoS Evaluation of VoIP End-Points . In Proceedings of the IEEE International Conference on Communications. Wenyu Jiang, Kazuumi Koguchi, and Henning Schulzrinne. 2003. QoS Evaluation of VoIP End-Points. In Proceedings of the IEEE International Conference on Communications."},{"key":"e_1_3_2_1_37_1","unstructured":"Erin Kelly. 2017. Bipartisan Bill Seeks Warrants for Police Use of 'Stingray' Cell Trackers. (2017). https:\/\/www.usatoday.com\/story\/news\/politics\/onpolitics\/2017\/02\/15\/bipartisan-bill-seeks-warrants-police-use-stingray-cell-trackers\/97954214\/  Erin Kelly. 2017. Bipartisan Bill Seeks Warrants for Police Use of 'Stingray' Cell Trackers. (2017). https:\/\/www.usatoday.com\/story\/news\/politics\/onpolitics\/2017\/02\/15\/bipartisan-bill-seeks-warrants-police-use-stingray-cell-trackers\/97954214\/"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2011.6082538"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/3416078","article-title":"Who Has Access to Your Smartphone Data","volume":"63","author":"Kirkpatrick Keith","year":"2020","unstructured":"Keith Kirkpatrick . 2020 . Who Has Access to Your Smartphone Data ? Commun. ACM 63 , 10 (2020), 15 -- 17 . Keith Kirkpatrick. 2020. Who Has Access to Your Smartphone Data? Commun. ACM 63, 10 (2020), 15--17.","journal-title":"Commun. ACM"},{"key":"e_1_3_2_1_40_1","unstructured":"Alissa Valentina Knight. 2020. Hacking GSM: Building a Rogue Base Station to Hack Cellular Devices. https:\/\/www.linkedin.com\/pulse\/hacking-gsm-building-rogue-base-station-hack-cellular-alissa\/.  Alissa Valentina Knight. 2020. Hacking GSM: Building a Rogue Base Station to Hack Cellular Devices. https:\/\/www.linkedin.com\/pulse\/hacking-gsm-building-rogue-base-station-hack-cellular-alissa\/."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23098"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00001"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2601009"},{"key":"e_1_3_2_1_44_1","unstructured":"Tim McMillan. 2021. A Secretive Technology Could Be Bad News For Capitol Rioters. https:\/\/thedebrief.org\/a-secretive-technology-could-be-bad-news-for-capitol-rioters\/.  Tim McMillan. 2021. A Secretive Technology Could Be Bad News For Capitol Rioters. https:\/\/thedebrief.org\/a-secretive-technology-could-be-bad-news-for-capitol-rioters\/."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023662"},{"key":"e_1_3_2_1_46_1","volume-title":"Gotta Catch 'Em All: Understanding How IMSI-Catchers Exploit Cell Networks","author":"Nasser Yomna","year":"2019","unstructured":"Yomna Nasser . 2019. Gotta Catch 'Em All: Understanding How IMSI-Catchers Exploit Cell Networks . Electronic Frontier Foundation ( 2019 ). https:\/\/www.eff.org\/wp\/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks Yomna Nasser. 2019. Gotta Catch 'Em All: Understanding How IMSI-Catchers Exploit Cell Networks. Electronic Frontier Foundation (2019). https:\/\/www.eff.org\/wp\/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks"},{"key":"e_1_3_2_1_47_1","volume-title":"DC's Stingray Mess Won't Get Cleaned Up. Wired","author":"Newman Lily Hay","year":"2018","unstructured":"Lily Hay Newman . 2018. DC's Stingray Mess Won't Get Cleaned Up. Wired ( 2018 ). https:\/\/www.wired.com\/story\/dcs-stingray-dhs-surveillance\/ Lily Hay Newman. 2018. DC's Stingray Mess Won't Get Cleaned Up. Wired (2018). https:\/\/www.wired.com\/story\/dcs-stingray-dhs-surveillance\/"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Peter Ney Ian Smith Gabriel Cadamuro and Tadayoshi Kohno. 2017. SeaGlass: Enabling City-Wide IMSI-Catcher Detection. (2017) 39--56.  Peter Ney Ian Smith Gabriel Cadamuro and Tadayoshi Kohno. 2017. SeaGlass: Enabling City-Wide IMSI-Catcher Detection. (2017) 39--56.","DOI":"10.1515\/popets-2017-0027"},{"key":"e_1_3_2_1_49_1","unstructured":"United States Naval Observatory. 2021. Telephone Time. https:\/\/www.usno.navy.mil\/USNO\/time\/telephone-time  United States Naval Observatory. 2021. Telephone Time. https:\/\/www.usno.navy.mil\/USNO\/time\/telephone-time"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the USENIX Workshop on Offensive Technologies (WOOT).","author":"Park Shinjo","year":"2017","unstructured":"Shinjo Park , Altaf Shaik , Ravishankar Borgaonkar , Andrew Martin , and Jean-Pierre Seifert . 2017 . White-Stingray: Evaluating IMSI Catchers Detection Applications . In Proceedings of the USENIX Workshop on Offensive Technologies (WOOT). Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Andrew Martin, and Jean-Pierre Seifert. 2017. White-Stingray: Evaluating IMSI Catchers Detection Applications. In Proceedings of the USENIX Workshop on Offensive Technologies (WOOT)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338498.3358649"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00006"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899254"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2007.376605"},{"key":"e_1_3_2_1_55_1","volume-title":"The 5G Protocol May Still Be Vulnerable to IMSI Catchers","author":"Quintin Cooper","year":"2019","unstructured":"Cooper Quintin . 2019. The 5G Protocol May Still Be Vulnerable to IMSI Catchers . Electronic Frontier Foundation ( 2019 ). https:\/\/www.eff.org\/deeplinks\/2019\/01\/5g-protocol-may-still-be-vulnerable-imsi-catchers Cooper Quintin. 2019. The 5G Protocol May Still Be Vulnerable to IMSI Catchers. Electronic Frontier Foundation (2019). https:\/\/www.eff.org\/deeplinks\/2019\/01\/5g-protocol-may-still-be-vulnerable-imsi-catchers"},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Reaves Bradley","year":"2016","unstructured":"Bradley Reaves , Logan Blue , and Patrick Traynor . 2016 . Authloop: End-to-End Cryptographic Authentication for Telephony Over Voice Channels . In Proceedings of the USENIX Security Symposium. Bradley Reaves, Logan Blue, and Patrick Traynor. 2016. Authloop: End-to-End Cryptographic Authentication for Telephony Over Voice Channels. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_57_1","unstructured":"Stefan Rommer Peter Hedman Magnus Olsson Lars Frid Shabnam Sultana and Catherine Mulligan. 2019. 5G Core Networks: Powering Digitalization.  Stefan Rommer Peter Hedman Magnus Olsson Lars Frid Shabnam Sultana and Catherine Mulligan. 2019. 5G Core Networks: Powering Digitalization."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.160"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.20533\/ijisr.2042.4639.2013.0037"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2016.7740306"},{"key":"e_1_3_2_1_61_1","volume-title":"Ruhr-Universit\u00e4t Bochum","author":"Strobel Daehyun","year":"2007","unstructured":"Daehyun Strobel . 2007. IMSI catcher. Chair for Communication Security , Ruhr-Universit\u00e4t Bochum ( 2007 ). Daehyun Strobel. 2007. IMSI catcher. Chair for Communication Security, Ruhr-Universit\u00e4t Bochum (2007)."},{"volume-title":"Proceedings of the ACM Conference on Computer and Communications Security.","author":"Tippenhauer Nils Ole","key":"e_1_3_2_1_62_1","unstructured":"Nils Ole Tippenhauer , C. P\u00f6pper , Kasper Bonne Rasmussen , and S. Capkun . 2011. On the Requirements for Successful GPS Spoofing Attacks . In Proceedings of the ACM Conference on Computer and Communications Security. Nils Ole Tippenhauer, C. P\u00f6pper, Kasper Bonne Rasmussen, and S. Capkun. 2011. On the Requirements for Successful GPS Spoofing Attacks. In Proceedings of the ACM Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2019.113194"},{"key":"e_1_3_2_1_64_1","unstructured":"Zack Whittaker. 2017. Security Flaw Shows 3G 4G LTE Networks are Just as Prone to Stingray Phone Tracking. (2017). https:\/\/www.zdnet.com\/article\/stingray-security-flaw-cell-networks-phone-tracking-surveillance\/  Zack Whittaker. 2017. Security Flaw Shows 3G 4G LTE Networks are Just as Prone to Stingray Phone Tracking. (2017). https:\/\/www.zdnet.com\/article\/stingray-security-flaw-cell-networks-phone-tracking-surveillance\/"},{"key":"e_1_3_2_1_65_1","volume-title":"New 5G Flaws Can Track Phone Locations and Spoof Emergency Alerts. Tech Crunch","author":"Whittaker Zack","year":"2019","unstructured":"Zack Whittaker . 2019. New 5G Flaws Can Track Phone Locations and Spoof Emergency Alerts. Tech Crunch ( 2019 ). https:\/\/techcrunch.com\/2019\/11\/12\/5g-flaws-locations-spoof-alerts\/ Zack Whittaker. 2019. New 5G Flaws Can Track Phone Locations and Spoof Emergency Alerts. Tech Crunch (2019). https:\/\/techcrunch.com\/2019\/11\/12\/5g-flaws-locations-spoof-alerts\/"},{"key":"e_1_3_2_1_66_1","volume-title":"How Cops Can Secretly Track Your Phone. The Intercept","author":"Zetter Kim","year":"2020","unstructured":"Kim Zetter . 2020. How Cops Can Secretly Track Your Phone. The Intercept ( 2020 ). https:\/\/theintercept.com\/2020\/07\/31\/protests-surveillance-stingrays-dirtboxes-phone-tracking\/ Kim Zetter. 2020. How Cops Can Secretly Track Your Phone. The Intercept (2020). https:\/\/theintercept.com\/2020\/07\/31\/protests-surveillance-stingrays-dirtboxes-phone-tracking\/"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196521"}],"event":{"name":"MobiSys '23: 21st Annual International Conference on Mobile Systems, Applications and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Helsinki Finland","acronym":"MobiSys '23"},"container-title":["Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581791.3596846","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:30Z","timestamp":1750178190000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581791.3596846"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,18]]},"references-count":65,"alternative-id":["10.1145\/3581791.3596846","10.1145\/3581791"],"URL":"https:\/\/doi.org\/10.1145\/3581791.3596846","relation":{},"subject":[],"published":{"date-parts":[[2023,6,18]]},"assertion":[{"value":"2023-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}