Cellular Security: Why is it difficult?

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 59
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKim, Yongdaeko
dc.date.accessioned2022-09-29T06:00:27Z-
dc.date.available2022-09-29T06:00:27Z-
dc.date.created2022-09-27-
dc.date.created2022-09-27-
dc.date.created2022-09-27-
dc.date.issued2022-05-30-
dc.identifier.citation17th ACM ASIA Conference on Computer and Communications Security 2022, ASIA CCS 2022, pp.392-
dc.identifier.urihttp://hdl.handle.net/10203/298772-
dc.description.abstractIn the last 10 years, I have been working on various cellular security problems publishing more than 10 papers. The topics include privacy [1, 5, 11], accounting [2, 3, 4], service security [3], Middleboxes and IPV6 [4], automatic performance analysis [4], (semi-)automatic security analysis [7, 9, 10], and physical layers [8]. Throughout these studies, and interactions with device vendors, carriers and 3GPP/GSMA representatives, I found several fundamental problems cellular industry is facing. I believe these problems could be the root cause for many of the vulnerabilities found by researchers. I will first explain 5 key insights that distinguish the cellular network security from traditional network security, including generation changes (4G vs. 5G), governance and closedness issues. I then talk about several technical difficulties cellular security research is facing. Several real examples will be given to connect concrete vulnerabilities and those technical difficulties. At the end of the talk, I will briefly talk about some suggestions to improve security of cellular networks.-
dc.languageEnglish-
dc.publisherAssociation for Computing Machinery, Inc-
dc.titleCellular Security: Why is it difficult?-
dc.typeConference-
dc.identifier.wosid000937026200030-
dc.identifier.scopusid2-s2.0-85133179060-
dc.type.rimsCONF-
dc.citation.beginningpage392-
dc.citation.publicationname17th ACM ASIA Conference on Computer and Communications Security 2022, ASIA CCS 2022-
dc.identifier.conferencecountryJA-
dc.identifier.conferencelocationVirtual-
dc.identifier.doi10.1145/3488932.3522770-
dc.contributor.localauthorKim, Yongdae-
Appears in Collection
EE-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0