2018
DOI: 10.1109/tmc.2018.2804913
|View full text |Cite
|
Sign up to set email alerts
|

Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…We envision that OSes can expose the modem information by requesting the permission from the user similar to how other high privilege permissions can be granted to user level applications. Additionally, in the future we aim to extend this for other OSes and baseband processors [28]. False positives and the quality of signatures.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…We envision that OSes can expose the modem information by requesting the permission from the user similar to how other high privilege permissions can be granted to user level applications. Additionally, in the future we aim to extend this for other OSes and baseband processors [28]. False positives and the quality of signatures.…”
Section: Discussionmentioning
confidence: 99%
“…For doing so, following the prior work [36], [52], [30], [29], [47], [42] we changed srsENB and srsEPC libraries in srsLTE [25] to set up the rogue base station. To collect the traces from the UE's perspective, we utilize SCAT [28]. () Once we have collected the concrete traces, we create skeletons of these traces akin to to the benign trace generation process (i.e., capturing message types and relevant predicates).…”
Section: Trace Generation For Evaluationmentioning
confidence: 99%
“…Although Bayesian network works well for fault diagnosis even for complex industrial systems, it has drawbacks for nonpermanent faults that provides only weak signals and for online fault diagnosis which are very slow. In line with the above, Hong et al [21] investigated fault diagnosis for the circuit-switched fall-back service. Although the investigation used detailed data of the signalling procedures from different mobile operators, the problem finding mechanism was manual and not subscriber-oriented.…”
Section: Root Cause Analysis (Rca) In Telecommunicationmentioning
confidence: 92%
“…Fang et al [15] analyze the implementation security of mobile basebands permuting the input with the support of reinforcement learning. Hong et al [23], [22] passively analyze the reallocation behavior of temporary identifiers and found that the reallocation is not sufficiently random, which allows the tracking of users. In our analysis, we focus on the cross-layer specification issues rather than the implementation security.…”
Section: Related Workmentioning
confidence: 99%