Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations. Kim, H., Kim, D., Kwon, M., Han, H., Jang, Y., Han, D., Kim, T., & Kim, Y.
abstract   bibtex   
Long Term Evolution (LTE) is becoming the dominant cellular networking technology, shifting the cellular network away from its circuit-switched legacy towards a packet-switched network that resembles the Internet. To support voice calls over the LTE network, operators have introduced Voice-over-LTE (VoLTE), which dramatically changes how voice calls are handled, both from user equipment and infrastructure perspectives. We find that this dramatic shift opens up a number of new attack surfaces that have not been previously explored. To call attention to this matter, this paper presents a systematic security analysis.
@article{kim_breaking_nodate,
	title = {Breaking and {Fixing} {VoLTE}: {Exploiting} {Hidden} {Data} {Channels} and {Mis}-implementations},
	abstract = {Long Term Evolution (LTE) is becoming the dominant cellular networking technology, shifting the cellular network away from its circuit-switched legacy towards a packet-switched network that resembles the Internet. To support voice calls over the LTE network, operators have introduced Voice-over-LTE (VoLTE), which dramatically changes how voice calls are handled, both from user equipment and infrastructure perspectives. We find that this dramatic shift opens up a number of new attack surfaces that have not been previously explored. To call attention to this matter, this paper presents a systematic security analysis.},
	language = {en},
	author = {Kim, Hongil and Kim, Dongkwan and Kwon, Minhee and Han, Hyungseok and Jang, Yeongjin and Han, Dongsu and Kim, Taesoo and Kim, Yongdae},
	pages = {13}
}

Downloads: 0