DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kune, Denis Foo | ko |
dc.contributor.author | Koelndorfer, John | ko |
dc.contributor.author | Hopper, Nicholas | ko |
dc.contributor.author | Kim, Yongdae | ko |
dc.date.accessioned | 2013-03-29T19:15:10Z | - |
dc.date.available | 2013-03-29T19:15:10Z | - |
dc.date.created | 2012-12-03 | - |
dc.date.created | 2012-12-03 | - |
dc.date.issued | 2012-02 | - |
dc.identifier.citation | ISOC Network & Distributed System Security Symposium (NDSS 2012) | - |
dc.identifier.uri | http://hdl.handle.net/10203/173122 | - |
dc.description.abstract | Cellular phones have become a ubiquitous means of communications with over 5 billion users worldwide in 2010, of which 80% are GSM subscribers. Due to their use of the wireless medium and their mobile nature, those phones listen to broadcast communications that could reveal their physical location to a passive adversary. In this paper, we investigate techniques to test if a user is present within a small area, or absent from a large area by simply listening on the broadcast GSM channels. With a combination of readily available hardware and open source software, we demonstrate practical location test attacks that include circumventing the temporary identifier designed to protect the identity of the end user. Finally we propose solutions that would improve the location privacy of users with low system impact. | - |
dc.language | English | - |
dc.publisher | USENIX | - |
dc.title | Location leaks on the GSM air interface | - |
dc.type | Conference | - |
dc.type.rims | CONF | - |
dc.citation.publicationname | ISOC Network & Distributed System Security Symposium (NDSS 2012) | - |
dc.identifier.conferencecountry | US | - |
dc.contributor.localauthor | Kim, Yongdae | - |
dc.contributor.nonIdAuthor | Kune, Denis Foo | - |
dc.contributor.nonIdAuthor | Koelndorfer, John | - |
dc.contributor.nonIdAuthor | Hopper, Nicholas | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.