Author of the publication

Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness.

, , and . WOOT, USENIX Association, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing the security of 4G and 5G mobile networks on protocol layer two.. Ruhr University Bochum, Germany, (2021)On the challenges of automata reconstruction in LTE networks., , and . WISEC, page 164-174. ACM, (2021)Lost traffic encryption: fingerprinting LTE/4G traffic on layer two., , , and . WiSec, page 249-260. ACM, (2019)LTE security disabled: misconfiguration in commercial networks., , , and . WiSec, page 261-266. ACM, (2019)Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE., , , and . USENIX Security Symposium, page 73-88. USENIX Association, (2020)5G SUCI-catchers: still catching them all?, , , and . WISEC, page 359-364. ACM, (2021)BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks., , , , and . WISEC, page 145-150. ACM, (2023)Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G., , , and . WISEC, page 97-108. ACM, (2023)The attacks aren't alright: Large-Scale Simulation of Fake Base Station Attacks and Detections., , and . CSET @ USENIX Security Symposium, page 54-64. ACM, (2024)Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness., , and . WOOT, USENIX Association, (2016)