# Conference papers on telecommunication security ------------- [toc] ## On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices ### NDSS 2021 ### Zeyu Lei, Yuhong Nan, Yanick Fratantonio, Antonio Bianchi Free access the [paper](https://www.eurecom.fr/publication/6460/download/sec-publi-6460.pdf) ## 5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol ### CCS 2019 ### Syed Rafiul Hussain; Mitziu Echeverria; Imtiaz Karim; Omar Chowdhury; Elisa Bertino Access the [paper](https://dl.acm.org/doi/pdf/10.1145/3319535.3354263) ## RFC 8224 SIP Identity, 2018 ####J. Peterson, C. Jennings, E. Rescorla, C. Wendt Access the [RFC](https://datatracker.ietf.org/doc/html/rfc8224) ## Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge ### Bradley Reaves and Ethan Shernan and Adam Bates and Henry Carter and Patrick Traynor ### USENIX Security Symposium 2015 Access the [paper](https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-reaves-boxed.pdf) ## BREAKING CELL PHONE AUTHENTICATION: VULNERABILITIES IN AKA, IMS, AND ANDROID ### {USENIX} Workshop on Offensive Technologies ({WOOT} 13) ### Beekman J, Thompson C Access the [paper](https://www.usenix.org/system/files/conference/woot13/woot13-beekman_0.pdf) ## Summary of the NCSC’s security analysis for the UK telecoms sector Access the [summary](https://www.ncsc.gov.uk/files/Summary%20of%20the%20NCSCs%20security%20analysis%20for%20the%20UK%20telecoms%20sector.pdf) ## A Testbed for Trusted Telecommunications Systems in a Safety Critical Environment ### Computer Safety, Reliability, and Security. SAFECOMP 2018 ### Ian Oliver, authorAapo KalliolaSilke, HoltmannsYoan MicheGabriela, LimontaBorger Vigmostad, Kiti Muller Access the [paper](https://secredas-project.eu/wp-content/uploads/2017/01/Nokia-A-Testbed-for-Trusted-Telecommunications-Systems-in-a-Safety-Critical-Environment.pdf) ## SIP CLF: A Common Log Format (CLF) for the Session Initiation Protocol (SIP) ### USENIX Workshop on Managing Systems via Log Analysis and Machine Learning Techniques -- SLAMLV 2010 ### Vijay K. Gurbani and Eric Burger and Carol Davids and Tricha Anjali Access the [paper](https://www.usenix.org/legacy/events/slaml10/tech/full_papers/Gurbani.pdf) ## Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks ### 2010 USENIX Annual Technical Conference (USENIX ATC 2010) ### Access the [paper](https://www.usenix.org/legacy/events/atc10/tech/full_papers/Dacosta.pdf) ## Billing Attacks on SIP-Based VoIP Systems ### USENIX Workshop on Offensive Technologies -- WOOT 2007 ### Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Xuxian Jiang Access the [paper](https://www.usenix.org/legacy/event/woot07/tech/full_papers/zhang/zhang.pdf)