{"id":"https://openalex.org/W2150401611","doi":"https://doi.org/10.1145/2535522","title":"An experimental security analysis of two satphone standards","display_name":"An experimental security analysis of two satphone standards","publication_year":2013,"publication_date":"2013-11-01","ids":{"openalex":"https://openalex.org/W2150401611","doi":"https://doi.org/10.1145/2535522","mag":"2150401611"},"language":"en","primary_location":{"id":"doi:10.1145/2535522","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2535522","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008154336","display_name":"Benedikt Driessen","orcid":null},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Benedikt Driessen","raw_affiliation_strings":["Ruhr-University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr-University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089252295","display_name":"Ralf Hund","orcid":null},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ralf Hund","raw_affiliation_strings":["Ruhr-University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr-University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077167083","display_name":"Carsten Willems","orcid":null},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Carsten Willems","raw_affiliation_strings":["Ruhr-University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr-University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041748332","display_name":"Christof Paar","orcid":"https://orcid.org/0000-0001-8681-2277"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christof Paar","raw_affiliation_strings":["Ruhr-University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr-University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056790702","display_name":"Thorsten Holz","orcid":"https://orcid.org/0000-0002-2783-1264"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thorsten Holz","raw_affiliation_strings":["Ruhr-University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr-University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5008154336"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":1.9769,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.89110409,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"16","issue":"3","first_page":"1","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9106539487838745},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7995316386222839},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.682248592376709},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6231260299682617},{"id":"https://openalex.org/keywords/brute-force-attack","display_name":"Brute-force attack","score":0.6045331954956055},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5550737380981445},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5373806953430176},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.5255699753761292},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.49279311299324036},{"id":"https://openalex.org/keywords/umts-frequency-bands","display_name":"UMTS frequency bands","score":0.48507967591285706},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47059857845306396},{"id":"https://openalex.org/keywords/gsm","display_name":"GSM","score":0.46923452615737915},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.4256952404975891},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.4210798144340515},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30820488929748535},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.17115896940231323}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9106539487838745},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7995316386222839},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.682248592376709},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6231260299682617},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.6045331954956055},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5550737380981445},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5373806953430176},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.5255699753761292},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.49279311299324036},{"id":"https://openalex.org/C101618186","wikidata":"https://www.wikidata.org/wiki/Q3633928","display_name":"UMTS frequency bands","level":2,"score":0.48507967591285706},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47059857845306396},{"id":"https://openalex.org/C59201141","wikidata":"https://www.wikidata.org/wiki/Q46904","display_name":"GSM","level":2,"score":0.46923452615737915},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.4256952404975891},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.4210798144340515},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30820488929748535},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.17115896940231323},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2535522","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2535522","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.642.822","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.642.822","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.emsec.rub.de/media/emma/veroeffentlichungen/2013/12/19/satphone-TISSEC13.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W172795436","https://openalex.org/W1414497871","https://openalex.org/W1544956979","https://openalex.org/W1554090281","https://openalex.org/W1563341929","https://openalex.org/W1576797895","https://openalex.org/W1603428681","https://openalex.org/W1641639920","https://openalex.org/W2063833036","https://openalex.org/W2095156129","https://openalex.org/W2097140439","https://openalex.org/W2102096888","https://openalex.org/W2107745473","https://openalex.org/W4300663557"],"related_works":["https://openalex.org/W2962693532","https://openalex.org/W1021131825","https://openalex.org/W2532587261","https://openalex.org/W1659518869","https://openalex.org/W3125786183","https://openalex.org/W2925105947","https://openalex.org/W2015449184","https://openalex.org/W2463179629","https://openalex.org/W4378587133","https://openalex.org/W2165305480"],"abstract_inverted_index":{"General-purpose":[0],"communication":[1,201],"systems":[2],"such":[3],"as":[4],"GSM":[5],"and":[6,40,73,82,89,108,134,160,181,202,245,261,264,272],"UMTS":[7],"have":[8,32],"been":[9],"in":[10,65,102,122,156,213,256,288],"the":[11,35,41,59,62,66,83,119,123,129,157,175,182,228,234,257,268,289],"focus":[12],"of":[13,37,48,61,77,177,197,230,239,259,270],"security":[14,60],"researchers":[15],"for":[16,170],"over":[17],"a":[18,94,103,109,149,281],"decade":[19],"now.":[20],"Recently":[21],"also":[22,231],"technologies":[23],"that":[24,57,162,204],"are":[25,206],"only":[26],"used":[27],"under":[28],"more":[29,247],"specific":[30],"circumstances":[31],"come":[33],"into":[34],"spotlight":[36],"academic":[38],"research":[39,254],"hacker":[42],"scene":[43],"alike.":[44],"A":[45],"striking":[46],"example":[47],"this":[49,115,240],"is":[50,242],"recent":[51],"work":[52,271],"[Driessen":[53],"et":[54],"al.":[55],"2012]":[56],"analyzed":[58],"over-the-air":[63],"encryption":[64],"two":[67],"existing":[68],"ETSI":[69],"satphone":[70],"standards":[71],"GMR-1":[72,260],"GMR-2.":[74],"The":[75,237],"firmware":[76],"handheld":[78],"devices":[79],"was":[80],"reverse-engineered":[81],"previously":[84],"unknown":[85],"stream":[86],"ciphers":[87,98],"A5-GMR-1":[88,107,133],"A5-GMR-2":[90],"were":[91,99],"recovered.":[92],"In":[93,114],"second":[95],"step,":[96],"both":[97],"cryptanalized,":[100],"resulting":[101],"ciphertext-only":[104],"attack":[105,111,131,151,180],"on":[106,112,132,233,250,267],"known-plaintext":[110],"A5-GMR-2.":[113],"work,":[116],"we":[117,127,147,193,205],"extend":[118],"aforementioned":[120],"results":[121,222,255],"following":[124],"ways:":[125],"First,":[126],"improve":[128],"proposed":[130],"reduce":[135],"its":[136],"average-case":[137],"complexity":[138],"from":[139,276],"2":[140,143],"32":[141],"to":[142,152,185,208,226,279,284],"21":[144],"steps.":[145],"Second,":[146],"implement":[148],"practical":[150,248],"successfully":[153],"record":[154],"communications":[155],"Thuraya":[158,210],"network":[159],"show":[161,203],"it":[163,187,274,287],"can":[164],"be":[165],"done":[166],"with":[167,223],"moderate":[168],"effort":[169],"approximately":[171],"$5,000.":[172],"We":[173,219],"describe":[174],"implementation":[176],"our":[178,190,198],"modified":[179],"crucial":[183],"aspects":[184],"make":[186],"practical.":[188],"Using":[189],"eavesdropping":[191,232],"setup,":[192],"recorded":[194],"30":[195],"seconds":[196],"own":[199],"satellite-to-satphone":[200],"able":[207],"recover":[209],"session":[211],"keys":[212],"half":[214],"an":[215],"hour":[216],"(on":[217],"average).":[218],"supplement":[220],"these":[221],"experiments":[224],"designed":[225],"highlight":[227],"feasibility":[229],"satphone's":[235],"emanations.":[236],"purpose":[238],"article":[241],"threefold:":[243],"Develop":[244],"demonstrate":[246],"attacks":[249],"A5-GMR-1,":[251],"summarize":[252],"current":[253],"field":[258],"GMR-2":[262],"security,":[263],"shed":[265],"light":[266],"amount":[269],"expertise":[273],"takes":[275],"setting":[277],"out":[278],"analyze":[280],"complex":[282],"system":[283],"actually":[285],"break":[286],"real":[290],"world.":[291]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
