{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T01:21:51Z","timestamp":1771377711486,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2142930"],"award-info":[{"award-number":["CNS-2142930"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,30]]},"DOI":"10.1145\/3678890.3678924","type":"proceedings-article","created":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T22:23:36Z","timestamp":1727648616000},"page":"693-708","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Fixing Insecure Cellular System Information Broadcasts For Good"],"prefix":"10.1145","author":[{"given":"Alexander J.","family":"Ross","sequence":"first","affiliation":[{"name":"North Carolina State University, United States of America"}]},{"given":"Bradley","family":"Reaves","sequence":"additional","affiliation":[{"name":"North Carolina State University, United States of America"}]},{"given":"Yomna","family":"Nasser","sequence":"additional","affiliation":[{"name":"Google, United States of America"}]},{"given":"Gil","family":"Cukierman","sequence":"additional","affiliation":[{"name":"Google, United States of America"}]},{"given":"Roger Piqueras","family":"Jover","sequence":"additional","affiliation":[{"name":"Google, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Moroccan Journalist Targeted With Network Injection Attacks Using NSO Group\u2019s Tools. https:\/\/www.amnesty.org\/en\/latest\/research\/2020\/06\/moroccan-journalist-targeted-with-network-injection-attacks-using-nso-groups-tools\/"},{"key":"e_1_3_2_1_2_1","unstructured":"3rd Generation Partnership Project (3GPP). 2022. 5G; NR; Radio Resource Control (RRC); Protocol specification (Release 17). 3GPP TS 38.331 V17.0.0 (May 2022)."},{"key":"e_1_3_2_1_3_1","volume-title":"Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN)","author":"Generation Partnership","year":"2022","unstructured":"3rd Generation Partnership Project (3GPP). 2022. Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall description; Stage 2 (Release 17). 3GPP TS 36.300, V17.0.0 (May 2022)."},{"key":"e_1_3_2_1_4_1","volume-title":"Evolved Universal Terrestrial Radio Access (E-UTRA)","author":"Generation Partnership","year":"2023","unstructured":"3rd Generation Partnership Project (3GPP). 2023. Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol specification (Release 17). 3GPP TS 36.331, V17.5.0 (July 2023)."},{"key":"e_1_3_2_1_5_1","volume-title":"Universal Mobile Telecommunications System (UMTS)","author":"Generation Partnership","year":"2024","unstructured":"3rd Generation Partnership Project (3GPP). 2024. Universal Mobile Telecommunications System (UMTS); LTE; 5G; Network Domain Security (NDS); Authentication Framework (AF) (Release 17). 3GPP TS 33.310, V17.8.0 (Jan. 2024)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3568000"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00104"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3324927"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664272"},{"key":"e_1_3_2_1_10_1","unstructured":"Kieran Devine. 2023. Ukraine war: Mobile networks being weaponised to target troops on both sides of conflict. https:\/\/news.sky.com\/story\/ukraine-war-mobile-networks-being-weaponised-to-target-troops-on-both-sides-of-conflict-12577595"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560525"},{"key":"e_1_3_2_1_13_1","unstructured":"Ettus Research. [n. d.]. Ettus Research USRP."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8756977"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980159.2980163"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","unstructured":"Jeff Hodges Collin Jackson and Adam Barth. 2012. HTTP Strict Transport Security (HSTS). RFC 6797. https:\/\/doi.org\/10.17487\/RFC6797","DOI":"10.17487\/RFC6797"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23313"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354263"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323402"},{"key":"e_1_3_2_1_20_1","volume-title":"LTE security, protocol exploits and location tracking experimentation with low-cost software radio. arXiv:1607.05171 [cs] (July","author":"Jover Roger\u00a0Piqueras","year":"2016","unstructured":"Roger\u00a0Piqueras Jover. 2016. LTE security, protocol exploits and location tracking experimentation with low-cost software radio. arXiv:1607.05171 [cs] (July 2016). http:\/\/arxiv.org\/abs\/1607.05171 arXiv:1607.05171."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00038"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326082"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23098"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7452266"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3558482.3590187"},{"key":"e_1_3_2_1_26_1","volume-title":"Computer Network Security","author":"Mj\u00f8lsnes F.","unstructured":"Stig\u00a0F. Mj\u00f8lsnes and Ruxandra\u00a0F. Olimid. 2017. Easy 4G\/LTE IMSI Catchers for Non-Programmers. In Computer Network Security, Jacek Rak, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, and Krzysztof Szczypiorski (Eds.). Springer International Publishing, Cham, 235\u2013246."},{"key":"e_1_3_2_1_27_1","volume-title":"White-Stingray: Evaluating IMSI Catchers Detection Applications. In 11th USENIX Workshop on Offensive Technologies (WOOT 17)","author":"Park Shinjo","year":"2017","unstructured":"Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Andrew Martin, and Jean-Pierre Seifert. 2017. White-Stingray: Evaluating IMSI Catchers Detection Applications. In 11th USENIX Workshop on Offensive Technologies (WOOT 17). USENIX Association, Vancouver, BC. https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/park"},{"key":"e_1_3_2_1_28_1","unstructured":"Eric Priezkalns. 2023. Paris IMSI-Catcher Mistaken for Bomb Was Actually Used for Health Insurance SMS Phishing Scam."},{"key":"e_1_3_2_1_29_1","unstructured":"Eric Priezkalns. 2023. Thousands Tricked Into Revealing Banking Details by Smishing IMSI-Catcher Driven around Norway. https:\/\/commsrisk.com\/thousands-tricked-into-revealing-banking-details-by-smishing-imsi-catcher-driven-around-norway\/"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78813-5_16"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485833"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2820728"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00006"},{"key":"e_1_3_2_1_34_1","volume-title":"Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Rupprecht David","year":"2020","unstructured":"David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina P\u00f6pper. 2020. Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 73\u201388. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/rupprecht"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23236"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453082"},{"key":"e_1_3_2_1_37_1","volume-title":"Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Yang Hojoon","year":"2019","unstructured":"Hojoon Yang, Sangwook Bae, Mincheol Son, Hongil Kim, S. Kim, and Yongdae Kim. 2019. Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 55\u201372. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/yang-hojoon"},{"key":"e_1_3_2_1_38_1","unstructured":"Kim Zetter. 2020. How Cops Can Secretly Track Your Phone. https:\/\/theintercept.com\/2020\/07\/31\/protests-surveillance-stingrays-dirtboxes-phone-tracking\/"}],"event":{"name":"RAID '24: The 27th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Padua Italy","acronym":"RAID '24"},"container-title":["The 27th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678924","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3678890.3678924","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678890.3678924","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:00Z","timestamp":1750295880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678924"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":38,"alternative-id":["10.1145\/3678890.3678924","10.1145\/3678890"],"URL":"https:\/\/doi.org\/10.1145\/3678890.3678924","relation":{},"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2024-09-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}