Communications of the ACM
Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Security problems in the TCP/IP protocol suite
ACM SIGCOMM Computer Communication Review
Information and control in gray-box systems
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Mobile phones for the next generation: device designs for teenagers
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Exploiting Gray-Box Knowledge of Buffer-Cache Management
ATEC '02 Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
Fast and Robust Signaling Overload Control
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Analysis of a Denial of Service Attack on TCP
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
IEEE Security and Privacy
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
Defending against an Internet-based attack on the physical world
ACM Transactions on Internet Technology (TOIT)
New client puzzle outsourcing techniques for DoS resistance
Proceedings of the 11th ACM conference on Computer and communications security
Spamming, phishing, authentication, and privacy
Communications of the ACM - The Blogosphere
IEEE Security and Privacy
Phishing Attacks Rising, But Dollar Losses Down
IEEE Security and Privacy
CAPTCHA: using hard AI problems for security
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Recognizing objects in adversarial clutter: breaking a visual captcha
CVPR'03 Proceedings of the 2003 IEEE computer society conference on Computer vision and pattern recognition
Unwanted traffic in 3G networks
ACM SIGCOMM Computer Communication Review
Mitigating attacks on open functionality in SMS-capable cellular networks
Proceedings of the 12th annual international conference on Mobile computing and networking
Impact of paging channel overloads or attacks on a cellular network
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
SmartSiren: virus detection and alert for smartphones
Proceedings of the 5th international conference on Mobile systems, applications and services
Mining call and mobility data to improve paging efficiency in cellular networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
On attack causality in internet-connected cellular networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Behavioral detection of malware on mobile handsets
Proceedings of the 6th international conference on Mobile systems, applications, and services
Detecting energy-greedy anomalies and mobile malware variants
Proceedings of the 6th international conference on Mobile systems, applications, and services
A mobile spatial messaging service for a grassroots environmental network
Journal of Location Based Services
Exploiting open functionality in SMS-capable cellular networks
Journal of Computer Security
Voice pharming attack and the trust of VoIP
Proceedings of the 4th international conference on Security and privacy in communication netowrks
On the detection of signaling DoS attacks on 3G/WiMax wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
EC-Web 2009 Proceedings of the 10th International Conference on E-Commerce and Web Technologies
SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
VirusMeter: Preventing Your Cellphone from Spies
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
MobileDeck: turning SMS into a rich user experience
Mobility '09 Proceedings of the 6th International Conference on Mobile Technology, Application & Systems
Review: A review of DoS attack models for 3G cellular networks from a system-design perspective
Computer Communications
Rootkits on smart phones: attacks, implications and opportunities
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Newport: enabling sharing during mobile calls
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ATMosphere: a system for atm microdeposit services in rural contexts
ICTD'09 Proceedings of the 3rd international conference on Information and communication technologies and development
Characterizing the transport behaviour of the short message service
Proceedings of the 8th international conference on Mobile systems, applications, and services
Realization of Call-Back Authentication (CBA) for secure web to cellular phone SMS communication
Computers & Mathematics with Applications
Injecting SMS messages into smart phones for security analysis
WOOT'09 Proceedings of the 3rd USENIX conference on Offensive technologies
Mobile location tracking in metro areas: malnets and others
Proceedings of the 17th ACM conference on Computer and communications security
D(e|i)aling with VoIP: robust prevention of DIAL attacks
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Multi-vendor penetration testing in the advanced metering infrastructure
Proceedings of the 26th Annual Computer Security Applications Conference
Exploiting smart-phone USB connectivity for fun and profit
Proceedings of the 26th Annual Computer Security Applications Conference
Ubiquitous information gathering with SMS query service
TELE-INFO'06 Proceedings of the 5th WSEAS international conference on Telecommunications and informatics
A specification based intrusion detection framework for mobile phones
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
SMS of death: from analyzing to attacking mobile phones on a large scale
SEC'11 Proceedings of the 20th USENIX conference on Security
A data mining framework for securing 3g core network from GTP fuzzing attacks
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Design of SMS commanded-and-controlled and P2P-structured mobile botnets
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Periodic route selection for secure packet delivery
Proceedings of the CUBE International Information Technology Conference
Mobile data charging: new attacks and countermeasures
Proceedings of the 2012 ACM conference on Computer and communications security
Active tracking in mobile networks: An in-depth view
Computer Networks: The International Journal of Computer and Telecommunications Networking
Measurement and modeling of paging channel overloads on a cellular network
Computer Networks: The International Journal of Computer and Telecommunications Networking
The curse of 140 characters: evaluating the efficacy of SMS spam detection on android
Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices
SEC'13 Proceedings of the 22nd USENIX conference on Security
Let me answer that for you: exploiting broadcast information in cellular networks
SEC'13 Proceedings of the 22nd USENIX conference on Security
Hi-index | 0.00 |
Cellular networks are a critical component of the economic and social infrastructures in which we live. In addition to voice services, these networks deliver alphanumeric text messages to the vast majority of wireless subscribers. To encourage the expansion of this new service, telecommunications companies offer connections between their networks and the Internet. The ramifications of such connections, however, have not been fully recognized. In this paper, we evaluate the security impact of the SMS interface on the availability of the cellular phone network. Specifically, we demonstrate the ability to deny voice service to cities the size of Washington D.C. and Manhattan with little more than a cable modem. Moreover, attacks targeting the entire United States are feasible with resources available to medium-sized zombie networks. This analysis begins with an exploration of the structure of cellular networks. We then characterize network behavior and explore a number of reconnaissance techniques aimed at effectively targeting attacks on these systems. We conclude by discussing countermeasures that mitigate or eliminate the threats introduced by these attacks.