# Conference papers on telecommunication security
-------------
[toc]
## On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices
### NDSS 2021
### Zeyu Lei, Yuhong Nan, Yanick Fratantonio, Antonio Bianchi
Free access the [paper](https://www.eurecom.fr/publication/6460/download/sec-publi-6460.pdf)
## 5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol
### CCS 2019
### Syed Rafiul Hussain; Mitziu Echeverria; Imtiaz Karim; Omar Chowdhury; Elisa Bertino
Access the [paper](https://dl.acm.org/doi/pdf/10.1145/3319535.3354263)
## RFC 8224 SIP Identity, 2018
####J. Peterson, C. Jennings, E. Rescorla, C. Wendt
Access the [RFC](https://datatracker.ietf.org/doc/html/rfc8224)
## Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge
### Bradley Reaves and Ethan Shernan and Adam Bates and Henry Carter and Patrick Traynor
### USENIX Security Symposium 2015
Access the [paper](https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-reaves-boxed.pdf)
## BREAKING CELL PHONE AUTHENTICATION: VULNERABILITIES IN AKA, IMS, AND ANDROID
### {USENIX} Workshop on Offensive Technologies ({WOOT} 13)
### Beekman J, Thompson C
Access the [paper](https://www.usenix.org/system/files/conference/woot13/woot13-beekman_0.pdf)
## Summary of the NCSC’s security analysis for the UK telecoms sector
Access the [summary](https://www.ncsc.gov.uk/files/Summary%20of%20the%20NCSCs%20security%20analysis%20for%20the%20UK%20telecoms%20sector.pdf)
## A Testbed for Trusted Telecommunications Systems in a Safety Critical Environment
### Computer Safety, Reliability, and Security. SAFECOMP 2018
### Ian Oliver, authorAapo KalliolaSilke, HoltmannsYoan MicheGabriela, LimontaBorger Vigmostad, Kiti Muller
Access the [paper](https://secredas-project.eu/wp-content/uploads/2017/01/Nokia-A-Testbed-for-Trusted-Telecommunications-Systems-in-a-Safety-Critical-Environment.pdf)
## SIP CLF: A Common Log Format (CLF) for the Session Initiation Protocol (SIP)
### USENIX Workshop on Managing Systems via Log Analysis and Machine Learning Techniques -- SLAMLV 2010
### Vijay K. Gurbani and Eric Burger and Carol Davids and Tricha Anjali
Access the [paper](https://www.usenix.org/legacy/events/slaml10/tech/full_papers/Gurbani.pdf)
## Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks
### 2010 USENIX Annual Technical Conference (USENIX ATC 2010)
###
Access the [paper](https://www.usenix.org/legacy/events/atc10/tech/full_papers/Dacosta.pdf)
## Billing Attacks on SIP-Based VoIP Systems
### USENIX Workshop on Offensive Technologies -- WOOT 2007
### Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Xuxian Jiang
Access the [paper](https://www.usenix.org/legacy/event/woot07/tech/full_papers/zhang/zhang.pdf)