{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:33Z","timestamp":1750309593785,"version":"3.41.0"},"reference-count":11,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T00:00:00Z","timestamp":1745971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["GetMobile: Mobile Comp. and Comm."],"published-print":{"date-parts":[[2025,4,30]]},"abstract":"<jats:p>The IP Multimedia Subsystem (IMS) delivers IP multimedia services, such as voice\/video calling and texting, to mobile users over cellular networks. In the past two decades, IMS services have been augmented to support various access networks, incorporating VoLTE (Voice over LTE), VoNR (Voice over New Radio), and VoWi-Fi (Voice over Wi-Fi). IMS security has also been enhanced with a suite of well-examined mechanisms, including 5G\/4G AKA (Authentication and Key Agreement), cellular-specific multilayer security, and IMS media security [1, 2, 3]. However, despite constant upgrades by 3GPP over the past two decades to support heterogeneous radio access networks (e.g., 4G LTE, 5G NR, and Wi-Fi) and enhance IMS security, the focus has primarily been on cellular infrastructure. Consequently, IMS security measures on ME (Mobile Equipment), such as smartphones, lag behind rapid technological advancements, resulting in new security vulnerabilities and unprecedented attacks.<\/jats:p>","DOI":"10.1145\/3733892.3733899","type":"journal-article","created":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T04:18:14Z","timestamp":1746073094000},"page":"20-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["IMS is Not That Secure on Your 5G\/4G Phones"],"prefix":"10.1145","volume":"29","author":[{"given":"Jingwen","family":"Shi","sequence":"first","affiliation":[{"name":"Michigan State University, MI, USA"}]},{"given":"Sihan","family":"Wang","sequence":"additional","affiliation":[{"name":"Michigan State University, MI, USA"}]},{"given":"Min-Yue","family":"Chen","sequence":"additional","affiliation":[{"name":"Michigan State University, MI, USA"}]},{"given":"Yiwen","family":"Hu","sequence":"additional","affiliation":[{"name":"Michigan State University, MI, USA"}]},{"given":"Guan-Hua","family":"Tu","sequence":"additional","affiliation":[{"name":"Michigan State University, MI, USA"}]},{"given":"Tian","family":"Xie","sequence":"additional","affiliation":[{"name":"Utah State University, UT, USA"}]},{"given":"Man-Hsin","family":"Chen","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"given":"Chi-Yu","family":"Li","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"given":"Chunyi","family":"Peng","sequence":"additional","affiliation":[{"name":"Purdue University, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,30]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"3G security","author":"PP.","year":"2022","unstructured":"3GPP. TS 33.102: 3G security; Security architecture (V17.0.0), March 2022."},{"key":"e_1_2_1_2_1","volume-title":"Network Domain Security (NDS)","author":"PP.","year":"2022","unstructured":"3GPP. TS 33.210: Network Domain Security (NDS); IP network layer security (V17.1.0), Sept. 2022."},{"key":"e_1_2_1_3_1","volume-title":"Nov.","author":"PP.","year":"2018","unstructured":"3GPP. TS 33.328: IP Multimedia Subsystem (IMS) media plane security, Nov. 2018."},{"key":"e_1_2_1_4_1","volume-title":"Jan.","author":"SHAKEN.","year":"2024","unstructured":"Wikipedia. STIR\/SHAKEN. https:\/\/en.wikipedia. org\/wiki\/STIR\/SHAKEN, Jan. 2024."},{"key":"e_1_2_1_5_1","volume-title":"IP Multimedia Subsystem (IMS)","author":"PP.","year":"2023","unstructured":"3GPP. TS 23.228: IP Multimedia Subsystem (IMS); Stage 2 (Release 18), Mar. 2023."},{"key":"e_1_2_1_6_1","volume-title":"March","author":"PP.","year":"2022","unstructured":"3GPP. TS 33.501: Security architecture and procedures for 5G System (Release 18), March 2022."},{"key":"e_1_2_1_7_1","volume-title":"3G security","author":"PP.","year":"2022","unstructured":"3GPP. TS 33.203: 3G security; Access security for IP-based services (Release 17), March 2022."},{"volume-title":"Sept.","year":"2004","key":"e_1_2_1_8_1","unstructured":"3GPP2. 3GPP2C.S0015-A: Short Message Service (SMS) for Wideband Spread Spectrum Systems Release A, Sept. 2004."},{"key":"e_1_2_1_9_1","volume-title":"Nov.","author":"PP.","year":"2019","unstructured":"3GPP. TS 24.011: Point-to-Point (PP) Short Message Service (SMS) support on mobile radio interface, Nov. 2019."},{"key":"e_1_2_1_10_1","volume-title":"IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP)","author":"PP.","year":"2023","unstructured":"3GPP. TS 24.229: IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); Stage 3 (Release 18), April 2023."},{"volume-title":"Proceedings of the 30th Annual International Conference on Mobile Computing and Networking (MobiCom '24)","author":"Shi J.","key":"e_1_2_1_11_1","unstructured":"J. Shi, S. Wang, M.-Y. Chen, G.-H. Tue, T. Xie, M.-H. Chen, Y. Hu, C.-Y. Li, and C. Peng. 2024. IMS is not that secure on your 5G\/4G phones. Proceedings of the 30th Annual International Conference on Mobile Computing and Networking (MobiCom '24), 513--527."}],"container-title":["GetMobile: Mobile Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733892.3733899","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3733892.3733899","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:56Z","timestamp":1750298216000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733892.3733899"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,30]]},"references-count":11,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,4,30]]}},"alternative-id":["10.1145\/3733892.3733899"],"URL":"https:\/\/doi.org\/10.1145\/3733892.3733899","relation":{},"ISSN":["2375-0529","2375-0537"],"issn-type":[{"type":"print","value":"2375-0529"},{"type":"electronic","value":"2375-0537"}],"subject":[],"published":{"date-parts":[[2025,4,30]]},"assertion":[{"value":"2025-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}