{"id":"https://openalex.org/W4327767773","doi":"https://doi.org/10.1109/ccnc51644.2023.10059624","title":"5G RRC Protocol and Stack Vulnerabilities Detection via Listen-and-Learn","display_name":"5G RRC Protocol and Stack Vulnerabilities Detection via Listen-and-Learn","publication_year":2023,"publication_date":"2023-01-08","ids":{"openalex":"https://openalex.org/W4327767773","doi":"https://doi.org/10.1109/ccnc51644.2023.10059624"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc51644.2023.10059624","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc51644.2023.10059624","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 20th Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027373671","display_name":"Jingda Yang","orcid":"https://orcid.org/0009-0005-0532-8907"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jingda Yang","raw_affiliation_strings":["Stevens Institute of Technology,Hoboken,NJ","Stevens Institute of Technology, Hoboken, NJ"],"affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology,Hoboken,NJ","institution_ids":["https://openalex.org/I108468826"]},{"raw_affiliation_string":"Stevens Institute of Technology, Hoboken, NJ","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100346998","display_name":"Ying Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ying Wang","raw_affiliation_strings":["Stevens Institute of Technology,Hoboken,NJ","Stevens Institute of Technology, Hoboken, NJ"],"affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology,Hoboken,NJ","institution_ids":["https://openalex.org/I108468826"]},{"raw_affiliation_string":"Stevens Institute of Technology, Hoboken, NJ","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011492923","display_name":"Tuyen X. Tran","orcid":"https://orcid.org/0000-0002-2453-2285"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tuyen X. Tran","raw_affiliation_strings":["AT&#x0026;T Labs Research,Bedminster,NJ"],"affiliations":[{"raw_affiliation_string":"AT&#x0026;T Labs Research,Bedminster,NJ","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061994281","display_name":"Yanjun Pan","orcid":"https://orcid.org/0000-0001-6425-7102"},"institutions":[{"id":"https://openalex.org/I78715868","display_name":"University of Arkansas at Fayetteville","ror":"https://ror.org/05jbt9m15","country_code":"US","type":"education","lineage":["https://openalex.org/I78715868"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yanjun Pan","raw_affiliation_strings":["University of Arkansas,Fayetteville,AR","University of Arkansas, Fayetteville, AR"],"affiliations":[{"raw_affiliation_string":"University of Arkansas,Fayetteville,AR","institution_ids":["https://openalex.org/I78715868"]},{"raw_affiliation_string":"University of Arkansas, Fayetteville, AR","institution_ids":["https://openalex.org/I78715868"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5027373671"],"corresponding_institution_ids":["https://openalex.org/I108468826"],"apc_list":null,"apc_paid":null,"fwci":3.8405,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.94645654,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"236","last_page":"241"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9821792244911194},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8426767587661743},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6372294425964355},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.49392086267471313},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4594370722770691},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4517960548400879},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40103980898857117},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15861192345619202},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.13994100689888}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9821792244911194},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8426767587661743},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6372294425964355},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.49392086267471313},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4594370722770691},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4517960548400879},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40103980898857117},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15861192345619202},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.13994100689888},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccnc51644.2023.10059624","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc51644.2023.10059624","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 20th Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2058107586","https://openalex.org/W2546094875","https://openalex.org/W2762366901","https://openalex.org/W2792636363","https://openalex.org/W2889791335","https://openalex.org/W2962715987","https://openalex.org/W2987215725","https://openalex.org/W3194394634","https://openalex.org/W3195333310","https://openalex.org/W3198654303","https://openalex.org/W3216250204","https://openalex.org/W4317796310"],"related_works":["https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W2766647240","https://openalex.org/W4385301282","https://openalex.org/W2990186179","https://openalex.org/W3203597304","https://openalex.org/W4248424560","https://openalex.org/W4210660460","https://openalex.org/W3119380829","https://openalex.org/W4288084466"],"abstract_inverted_index":{"The":[0,207,219],"paper":[1],"proposes":[2],"a":[3,13,98,155],"protocol-independent":[4],"Listen-and":[5],"-Learn":[6],"(LAL)":[7],"based":[8,151,167],"fuzzing":[9,71,86,91,100,122,186,221],"system,":[10],"which":[11],"provides":[12],"systematic":[14],"solution":[15],"for":[16,28,192,238],"vulnerabilities":[17,112,129],"and":[18,26,30,33,46,48,80,82,124,140,188,227,234,240,244,247,252],"unintended":[19],"emergent":[20],"behavior":[21],"detection":[22,251],"with":[23,201],"sufficient":[24,190,224],"automation":[25],"scalability,":[27,226],"5G":[29,231],"nextG":[31],"protocols":[32,55,243],"large-scale":[34],"open":[35],"programmable":[36],"stacks.":[37],"We":[38],"use":[39,145],"the":[40,67,83,146,165,185],"relay":[41],"model":[42,152],"as":[43],"our":[44],"base":[45],"capture":[47],"interpret":[49],"packets":[50],"without":[51],"prior":[52],"knowledge":[53],"of":[54,64,66,76,105,133,158,181,204],"imple-mentation.":[56],"Radio":[57],"Resource":[58],"Control":[59],"(RRC)":[60],"is":[61],"selected":[62],"proof":[63],"concept":[65],"proposed":[68,84,220],"system.":[69],"Our":[70,103],"architecture":[72],"incorporates":[73],"two":[74],"abstractions":[75],"different":[77],"dimension":[78],"fuzzing-command-level":[79],"bit-level,":[81],"LAL":[85],"framework":[87],"focuses":[88],"on":[89],"command-level":[90,121],"covering":[92],"potential":[93,142,217],"attacks":[94],"by":[95],"autonomously":[96],"generating":[97],"comprehensive":[99],"case":[101],"set.":[102],"analysis":[104,157],"39":[106],"RRC":[107,115,134,196],"states":[108,160],"successfully":[109],"illustrates":[110],"129":[111],"resulting":[113],"in":[114,130,161],"connection":[116,175,197],"establishment":[117],"failure":[118,176],"from":[119],"205":[120],"cases":[123],"reveals":[125],"insights":[126],"into":[127],"exploitable":[128],"each":[131],"channel":[132],"procedure.":[135],"Furthermore,":[136],"to":[137,153,216,229],"assess":[138],"risks":[139],"prevent":[141],"vulnerability,":[143],"we":[144,169],"Long":[147],"Short-Term":[148],"Memory":[149],"(LSTM)":[150],"perform":[154],"deep":[156],"transaction":[159],"sequenced":[162],"commands.":[163],"With":[164],"LSTM":[166],"model,":[168],"efficiently":[170],"predict":[171],"more":[172],"than":[173],"95%":[174],"at":[177],"an":[178,202],"average":[179,203],"duration":[180],"0.059":[182],"seconds":[183],"after":[184],"attack":[187],"provide":[189],"time":[191],"proactive":[193,214],"defense":[194],"before":[195],"completion":[198],"or":[199],"failure,":[200],"3.49":[205],"seconds.":[206],"rapid":[208],"vulnerability":[209,250],"prediction":[210],"capability":[211],"also":[212],"enables":[213],"defenses":[215],"attacks.":[218],"system":[222,249],"offers":[223],"automation,":[225],"usability":[228],"improve":[230],"security":[232],"assurance,":[233],"could":[235],"be":[236],"used":[237],"existing":[239],"newly":[241],"released":[242],"stacks":[245],"validation":[246],"real-time":[248],"prediction.":[253]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":6}],"updated_date":"2026-01-24T23:23:39.755997","created_date":"2025-10-10T00:00:00"}
