{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:32:58Z","timestamp":1755225178838,"version":"3.43.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3708821.3733902","type":"proceedings-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T06:30:56Z","timestamp":1755066656000},"page":"1442-1458","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["SigN: SIMBox Activity Detection Through Latency Anomalies at the Cellular Edge"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8803-6256","authenticated-orcid":false,"given":"Anne Josiane","family":"Kouam","sequence":"first","affiliation":[{"name":"TU Berlin, Berlin, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1483-6269","authenticated-orcid":false,"given":"Aline Carneiro","family":"Viana","sequence":"additional","affiliation":[{"name":"INRIA, Palaiseau, Ile-de-France \/ Essonne, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9497-4890","authenticated-orcid":false,"given":"Philippe","family":"Martins","sequence":"additional","affiliation":[{"name":"Telecom Paris, Palaiseau, Ile-de-France \/ Essonne, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3924-5374","authenticated-orcid":false,"given":"C\u00e9dric","family":"Adjih","sequence":"additional","affiliation":[{"name":"INRIA, Palaiseau, Ile-de-France \/ Essonne, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6015-0292","authenticated-orcid":false,"given":"Alain","family":"Tchana","sequence":"additional","affiliation":[{"name":"Grenoble INP, Grenoble, France"}]}],"member":"320","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"key":"e_1_3_3_2_2_2","volume-title":"3G Security; Security architecture (Release 16)","year":"2020","unstructured":"3GPP. 2020. 3G Security; Security architecture (Release 16). Technical Specification TS 33.102. European Telecommunications Standards Institute (ETSI). https:\/\/www.etsi.org\/deliver\/etsi_ts\/133100_133199\/133102\/16.03.00_60\/ts_133102v160300p.pdf"},{"key":"e_1_3_3_2_3_2","volume-title":"3GPP TS 36.133: Requirements for support of radio resource management","year":"2021","unstructured":"3GPP. 2021. 3GPP TS 36.133: Requirements for support of radio resource management. Technical Report. 3GPP. https:\/\/www.3gpp.org\/ftp\/\/Specs\/archive\/36_series\/36.133\/36133-960.zip"},{"key":"e_1_3_3_2_4_2","volume-title":"General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access","year":"2022","unstructured":"3GPP. 2022. General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access. Technical Report TS 23.401. 3GPP. https:\/\/www.3gpp.org\/ftp\/Specs\/archive\/23_series\/23.401\/23401-i00.zip"},{"key":"e_1_3_3_2_5_2","volume-title":"Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Packet Core (EPC); Common test environments for User Equipment (UE) conformance testing","year":"2023","unstructured":"3GPP. 2023. Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Packet Core (EPC); Common test environments for User Equipment (UE) conformance testing. Technical Specification 36.508. 3GPP."},{"key":"e_1_3_3_2_6_2","volume-title":"LTE RRC Protocol Specification","year":"2023","unstructured":"3GPP. 2023. LTE RRC Protocol Specification. Technical Report TS 36.331. 3GPP. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2440"},{"key":"e_1_3_3_2_7_2","volume-title":"Non-Access-Stratum (NAS) Protocol for Evolved Packet System (EPS); Stage 3","year":"2023","unstructured":"3GPP. 2023. Non-Access-Stratum (NAS) Protocol for Evolved Packet System (EPS); Stage 3. Technical Report TS 24.301. 3GPP. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=1072"},{"key":"e_1_3_3_2_8_2","volume-title":"Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification","year":"2023","unstructured":"3GPP. 2023. Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification. Technical Specification 35.231. 3GPP."},{"key":"e_1_3_3_2_9_2","unstructured":"Amarisoft. 2025. Amarisoft Official Website. https:\/\/www.amarisoft.com. Accessed: 2025-01-13."},{"key":"e_1_3_3_2_10_2","volume-title":"CFCA 2019 Fraud Loss Survey","year":"2019","unstructured":"CFCA. 2019. CFCA 2019 Fraud Loss Survey. Technical Report. Communications Fraud Control Association. https:\/\/cfca.org\/document\/cfca-2019-fraud-loss-survey-pdf\/"},{"key":"e_1_3_3_2_11_2","volume-title":"Communications Fraud Control Association 2021 Fraud Loss Survey","year":"2021","unstructured":"CFCA. 2021. Communications Fraud Control Association 2021 Fraud Loss Survey. Technical Report. Communications Fraud Control Association. https:\/\/cfca.org\/wp-content\/uploads\/2021\/12\/CFCA-Fraud-Loss-Survey-2021-2.pdf"},{"key":"e_1_3_3_2_12_2","unstructured":"Communications Fraud Control Association. 2023. Telecommunications Fraud Increased 12% in 2023 Equating to an Estimated $38.95 Billion Lost to Fraud. https:\/\/cfca.org\/telecommunications-fraud-increased-12-in-2023-equating-to-an-estimated-38-95-billion-lost-to-fraud\/ Accessed: 2025-01-13."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8079914"},{"key":"e_1_3_3_2_14_2","volume-title":"LTE; General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access; Stage 2","year":"2018","unstructured":"ETSI. 2018. LTE; General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access; Stage 2. Technical Specification 123 401. ETSI. https:\/\/www.etsi.org\/deliver\/etsi_ts\/123400_123499\/123401\/15.04.00_60\/ts_123401v150400p.pdf"},{"key":"e_1_3_3_2_15_2","volume-title":"Universal Mobile Telecommunications System (UMTS); LTE; 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification (3GPP TS 35.206 version 14.0.0 Release 14)","year":"2021","unstructured":"ETSI. 2021. Universal Mobile Telecommunications System (UMTS); LTE; 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification (3GPP TS 35.206 version 14.0.0 Release 14). Technical Specification 35206. ETSI."},{"key":"e_1_3_3_2_16_2","volume-title":"Universal Mobile Telecommunications System (UMTS); LTE; Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3","year":"2021","unstructured":"ETSI. 2021. Universal Mobile Telecommunications System (UMTS); LTE; Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3. ETSI Technical Specification 124 301 V15.17.0. European Telecommunications Standards Institute. https:\/\/www.etsi.org\/deliver\/etsi_ts\/124300_124399\/124301\/15.04.00_60\/ts_124301v150400p.pdf"},{"key":"e_1_3_3_2_17_2","volume-title":"ETSI TS 100 977 V8.14.0 (2007-06)","author":"(ETSI) European Telecommunications Standards Institute","year":"2007","unstructured":"European Telecommunications Standards Institute (ETSI). 2007. ETSI TS 100 977 V8.14.0 (2007-06). Technical Specification. ETSI. https:\/\/www.etsi.org\/deliver\/etsi_ts\/100900_100999\/100977\/08.14.00_60\/ts_100977v081400p.pdf"},{"key":"e_1_3_3_2_18_2","unstructured":"GoAntiFraud. 2018. Top 5 Popular GSM Gateway Manufacturers. https:\/\/goantifraud.com\/en\/blog\/818-top-5-popular-gsm-gateway-manufacturers.html."},{"key":"e_1_3_3_2_19_2","unstructured":"GoAntiFraud. accessed 2023. Call Recording. https:\/\/goantifraud.com\/en\/ejointech-skyline-gsm-termination-solution#call-recording."},{"key":"e_1_3_3_2_20_2","unstructured":"Hybertone. Accessed 2023-04-27. Remote SIM Bank Model: SMB128. http:\/\/www.hybertone.com\/en\/pro_detail.asp?proid=57."},{"key":"e_1_3_3_2_21_2","unstructured":"Hagos Kahsu. 2018. SIM-Box Fraud Detection Using Data Mining Techniques: The Case of ethio telecom. Ph.\u00a0D. Dissertation. School of Electrical and Computer Engineering Addis Ababa Institute of Technology."},{"key":"e_1_3_3_2_22_2","volume-title":"REAL-TIME GREY CALL DETECTION SYSTEM USING COMPLEX EVENT PROCESSING","author":"Kehelwala KGDC","year":"2015","unstructured":"KGDC Kehelwala, HMND Bandara, RA Yasaratne, P De\u00a0Almeida, IKKS Ilesinghe, and PDKE Wickramasinghe. 2015. REAL-TIME GREY CALL DETECTION SYSTEM USING COMPLEX EVENT PROCESSING. Technical Report. IET, Sri Lanka. http:\/\/theiet.lk\/wp-content\/uploads\/2017\/10\/22-p7.pdf"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","unstructured":"Anne\u00a0Josiane Kouam Aline\u00a0Carneiro Viana and Alain Tchana. 2021. SIMBox bypass frauds in cellular networks: Strategies evolution detection and future directions. IEEE Communications Surveys Tutorials 23 4 (2021) 2295\u20132323. 10.1109\/COMST.2021.3100916","DOI":"10.1109\/COMST.2021.3100916"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3634737.3657023"},{"key":"e_1_3_3_2_25_2","unstructured":"Nicholas Krawczeniuk. 2019. Analysis of LTE network RF performance in a dense urban environment. Undergraduate thesis. Pace University. https:\/\/digitalcommons.pace.edu\/honorscollege_theses\/269"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVIA.2015.7351891"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848087"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","unstructured":"Diala Naboulsi Marco Fiore Stephane Ribot and Razvan Stanica. 2016. Large-Scale Mobile Traffic Analysis: A Survey. IEEE Communications Surveys & Tutorials 18 1 (2016) 124\u2013161. 10.1109\/COMST.2015.2491361","DOI":"10.1109\/COMST.2015.2491361"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24416"},{"key":"e_1_3_3_2_30_2","unstructured":"P1sec. accessed 2023-04-23. QCSuper: An open-source tool for capturing and decoding data transmitted over Qualcomm-based cellular devices. https:\/\/github.com\/P1sec\/QCSuper."},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831196"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5860-5_69"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.11113\/jt.v74.2649"},{"key":"e_1_3_3_2_34_2","unstructured":"SRS. accessed 2023. SRS 4G Documentation. https:\/\/docs.srsran.com\/projects\/4g\/en\/latest\/index.html."},{"key":"e_1_3_3_2_35_2","unstructured":"srsran\/srsRAN_4G. 2023. srsRAN 4G - pcsc_usim.cc. GitHub. https:\/\/github.com\/srsran\/srsRAN_4G\/blob\/master\/srsue\/src\/stack\/upper\/pcsc_usim.cc File: pcsc_usim.cc."},{"key":"e_1_3_3_2_36_2","unstructured":"Sysmocom. Accessed: March 8 2023. SysmoUSIM. https:\/\/www.sysmocom.de\/products\/lab\/sysmousim\/index.html."},{"key":"e_1_3_3_2_37_2","unstructured":"T-mobile. 2024. Bring your own phone when you switch to T\u2011Mobile.https:\/\/www.t-mobile.com\/resources\/bring-your-own-phone"},{"key":"e_1_3_3_2_38_2","unstructured":"Fitsum Tesfaye. 2020. Near-Real Time SIM-box Fraud Detection Using Machine Learning in the case of ethio telecom. Ph.\u00a0D. Dissertation. School of Electrical and Computer Engineering Addis Ababa Institute of Technology."},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","unstructured":"Bruno Veloso Shazia Tabassum Carlos Martins Raphael Espanha Raul Azevedo and Jo\u00e3o Gama. 2020. Interconnect bypass fraud detection: a case study. Annals of Telecommunications 75 (Oct. 2020) 583\u2013596. 10.1007\/s12243-020-00808-w","DOI":"10.1007\/s12243-020-00808-w"}],"event":{"name":"ASIA CCS '25: 20th ACM Asia Conference on Computer and Communications Security","location":"Hanoi Vietnam","acronym":"ASIA CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 20th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708821.3733902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T07:31:48Z","timestamp":1755070308000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708821.3733902"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":38,"alternative-id":["10.1145\/3708821.3733902","10.1145\/3708821"],"URL":"https:\/\/doi.org\/10.1145\/3708821.3733902","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"2025-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}