Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations. Kim, H., Kim, D., Kwon, M., Han, H., Jang, Y., Han, D., Kim, T., & Kim, Y. abstract bibtex Long Term Evolution (LTE) is becoming the dominant cellular networking technology, shifting the cellular network away from its circuit-switched legacy towards a packet-switched network that resembles the Internet. To support voice calls over the LTE network, operators have introduced Voice-over-LTE (VoLTE), which dramatically changes how voice calls are handled, both from user equipment and infrastructure perspectives. We find that this dramatic shift opens up a number of new attack surfaces that have not been previously explored. To call attention to this matter, this paper presents a systematic security analysis.
@article{kim_breaking_nodate,
title = {Breaking and {Fixing} {VoLTE}: {Exploiting} {Hidden} {Data} {Channels} and {Mis}-implementations},
abstract = {Long Term Evolution (LTE) is becoming the dominant cellular networking technology, shifting the cellular network away from its circuit-switched legacy towards a packet-switched network that resembles the Internet. To support voice calls over the LTE network, operators have introduced Voice-over-LTE (VoLTE), which dramatically changes how voice calls are handled, both from user equipment and infrastructure perspectives. We find that this dramatic shift opens up a number of new attack surfaces that have not been previously explored. To call attention to this matter, this paper presents a systematic security analysis.},
language = {en},
author = {Kim, Hongil and Kim, Dongkwan and Kwon, Minhee and Han, Hyungseok and Jang, Yeongjin and Han, Dongsu and Kim, Taesoo and Kim, Yongdae},
pages = {13}
}
Downloads: 0
{"_id":"Mi2Cr5j6Z3HKaEmbB","bibbaseid":"kim-kim-kwon-han-jang-han-kim-kim-breakingandfixingvolteexploitinghiddendatachannelsandmisimplementations","downloads":0,"creationDate":"2018-09-02T09:38:26.333Z","title":"Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations","author_short":["Kim, H.","Kim, D.","Kwon, M.","Han, H.","Jang, Y.","Han, D.","Kim, T.","Kim, Y."],"year":null,"bibtype":"article","biburl":"https://bibbase.org/zotero/21h","bibdata":{"bibtype":"article","type":"article","title":"Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations","abstract":"Long Term Evolution (LTE) is becoming the dominant cellular networking technology, shifting the cellular network away from its circuit-switched legacy towards a packet-switched network that resembles the Internet. To support voice calls over the LTE network, operators have introduced Voice-over-LTE (VoLTE), which dramatically changes how voice calls are handled, both from user equipment and infrastructure perspectives. We find that this dramatic shift opens up a number of new attack surfaces that have not been previously explored. To call attention to this matter, this paper presents a systematic security analysis.","language":"en","author":[{"propositions":[],"lastnames":["Kim"],"firstnames":["Hongil"],"suffixes":[]},{"propositions":[],"lastnames":["Kim"],"firstnames":["Dongkwan"],"suffixes":[]},{"propositions":[],"lastnames":["Kwon"],"firstnames":["Minhee"],"suffixes":[]},{"propositions":[],"lastnames":["Han"],"firstnames":["Hyungseok"],"suffixes":[]},{"propositions":[],"lastnames":["Jang"],"firstnames":["Yeongjin"],"suffixes":[]},{"propositions":[],"lastnames":["Han"],"firstnames":["Dongsu"],"suffixes":[]},{"propositions":[],"lastnames":["Kim"],"firstnames":["Taesoo"],"suffixes":[]},{"propositions":[],"lastnames":["Kim"],"firstnames":["Yongdae"],"suffixes":[]}],"pages":"13","bibtex":"@article{kim_breaking_nodate,\n\ttitle = {Breaking and {Fixing} {VoLTE}: {Exploiting} {Hidden} {Data} {Channels} and {Mis}-implementations},\n\tabstract = {Long Term Evolution (LTE) is becoming the dominant cellular networking technology, shifting the cellular network away from its circuit-switched legacy towards a packet-switched network that resembles the Internet. To support voice calls over the LTE network, operators have introduced Voice-over-LTE (VoLTE), which dramatically changes how voice calls are handled, both from user equipment and infrastructure perspectives. We find that this dramatic shift opens up a number of new attack surfaces that have not been previously explored. To call attention to this matter, this paper presents a systematic security analysis.},\n\tlanguage = {en},\n\tauthor = {Kim, Hongil and Kim, Dongkwan and Kwon, Minhee and Han, Hyungseok and Jang, Yeongjin and Han, Dongsu and Kim, Taesoo and Kim, Yongdae},\n\tpages = {13}\n}\n\n","author_short":["Kim, H.","Kim, D.","Kwon, M.","Han, H.","Jang, Y.","Han, D.","Kim, T.","Kim, Y."],"key":"kim_breaking_nodate","id":"kim_breaking_nodate","bibbaseid":"kim-kim-kwon-han-jang-han-kim-kim-breakingandfixingvolteexploitinghiddendatachannelsandmisimplementations","role":"author","urls":{},"downloads":0,"html":""},"search_terms":["breaking","fixing","volte","exploiting","hidden","data","channels","mis","implementations","kim","kim","kwon","han","jang","han","kim","kim"],"keywords":[],"authorIDs":[],"dataSources":["NpxDwkFvCjNmGYFSj"]}