{"id":"https://openalex.org/W2031427758","doi":"https://doi.org/10.1145/2660267.2660346","title":"Real Threats to Your Data Bills","display_name":"Real Threats to Your Data Bills","publication_year":2014,"publication_date":"2014-11-03","ids":{"openalex":"https://openalex.org/W2031427758","doi":"https://doi.org/10.1145/2660267.2660346","mag":"2031427758"},"language":"en","primary_location":{"id":"doi:10.1145/2660267.2660346","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2660267.2660346","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028740131","display_name":"Chunyi Peng","orcid":"https://orcid.org/0000-0002-2361-2224"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chunyi Peng","raw_affiliation_strings":["The Ohio State University, Columbus, OH, USA","The Ohio State University, Columbus, OH, USA.;"],"affiliations":[{"raw_affiliation_string":"The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]},{"raw_affiliation_string":"The Ohio State University, Columbus, OH, USA.;","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101531317","display_name":"Chi-Yu Li","orcid":"https://orcid.org/0000-0002-1077-6801"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chi-Yu Li","raw_affiliation_strings":["University of California, Los Angeles, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Los Angeles, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I161318765"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020607617","display_name":"Hongyi Wang","orcid":"https://orcid.org/0000-0001-8138-7531"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hongyi Wang","raw_affiliation_strings":["University of California, Los Angeles, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Los Angeles, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I161318765"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006027092","display_name":"Guan-Hua Tu","orcid":"https://orcid.org/0000-0002-2542-4817"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guan-Hua Tu","raw_affiliation_strings":["University of California, Los Angeles, University of California, Los , CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Los Angeles, University of California, Los , CA, USA","institution_ids":["https://openalex.org/I161318765"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020188879","display_name":"Songwu Lu","orcid":"https://orcid.org/0000-0003-3779-0918"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Songwu Lu","raw_affiliation_strings":["University of California, Los Angeles, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Los Angeles, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I161318765"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5028740131"],"corresponding_institution_ids":["https://openalex.org/I52357470"],"apc_list":null,"apc_paid":null,"fwci":2.0653,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.87232827,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"727","last_page":"738"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7555242776870728},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6863874793052673},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6724388003349304},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.5989157557487488},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5532193779945374},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.5244003534317017},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44989249110221863},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42738646268844604},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.4186228811740875},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12096494436264038},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.10705944895744324}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7555242776870728},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6863874793052673},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6724388003349304},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.5989157557487488},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5532193779945374},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.5244003534317017},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44989249110221863},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42738646268844604},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.4186228811740875},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12096494436264038},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.10705944895744324},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2660267.2660346","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2660267.2660346","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.800000011920929}],"awards":[{"id":"https://openalex.org/G3581736930","display_name":null,"funder_award_id":"CNS-1421933","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"},{"id":"https://openalex.org/G5884008701","display_name":null,"funder_award_id":"CNS-1422835","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W81879861","https://openalex.org/W83889586","https://openalex.org/W1482497150","https://openalex.org/W1587130936","https://openalex.org/W1972663735","https://openalex.org/W1983750266","https://openalex.org/W1989860229","https://openalex.org/W2000301061","https://openalex.org/W2016763420","https://openalex.org/W2045673642","https://openalex.org/W2061036215","https://openalex.org/W2070670160","https://openalex.org/W2087546474","https://openalex.org/W2097281067","https://openalex.org/W2101659471","https://openalex.org/W2107187535","https://openalex.org/W2110695400","https://openalex.org/W2115026336","https://openalex.org/W2119249378","https://openalex.org/W2125011234","https://openalex.org/W2129281072","https://openalex.org/W2132187255","https://openalex.org/W2133467782","https://openalex.org/W2140095007","https://openalex.org/W2159256070","https://openalex.org/W2167956239","https://openalex.org/W2399978149","https://openalex.org/W6603356336"],"related_works":["https://openalex.org/W2120447654","https://openalex.org/W2977179488","https://openalex.org/W2144453115","https://openalex.org/W2128223750","https://openalex.org/W4238532390","https://openalex.org/W2188872161","https://openalex.org/W2002978035","https://openalex.org/W2961779879","https://openalex.org/W797688974","https://openalex.org/W1585007175"],"abstract_inverted_index":{"Secure":[0],"mobile":[1],"data":[2],"charging":[3],"(MDC)":[4],"is":[5],"critical":[6],"to":[7,24,99],"cellular":[8,46,82,111],"network":[9],"operations.":[10],"It":[11],"must":[12],"charge":[13],"the":[14,18,42,85,108],"right":[15,19],"user":[16],"for":[17],"volume":[20,72],"that":[21,50],"(s)he":[22],"authorizes":[23],"consume":[25],"(i.e.,":[26],"requirements":[27],"of":[28,41,81],"authentication,":[29],"authorization,":[30],"and":[31,59,61,70,84,116],"accounting":[32,71],"(AAA)).":[33],"In":[34],"this":[35],"work,":[36],"we":[37],"conduct":[38],"security":[39],"analysis":[40],"MDC":[43],"system":[44],"in":[45,56,78],"networks.":[47,112],"We":[48,94,113],"find":[49],"all":[51],"three":[52,63,96],"can":[53,105],"be":[54],"breached":[55],"both":[57],"design":[58],"practice,":[60],"identify":[62],"concrete":[64],"vulnerabilities:":[65],"authentication":[66],"bypass,":[67],"authorization":[68],"fraud":[69],"inaccuracy.":[73],"The":[74],"root":[75],"causes":[76],"lie":[77],"technology":[79],"fundamentals":[80],"networks":[83],"Internet":[86],"IP":[87],"design,":[88],"as":[89,91],"well":[90],"imprudent":[92],"implementations.":[93],"devise":[95],"showcase":[97],"attacks":[98,104],"demonstrate":[100],"that,":[101],"even":[102],"simple":[103],"easily":[106],"penetrate":[107],"operational":[109],"3G/4G":[110],"further":[114],"propose":[115],"evaluate":[117],"defense":[118],"solutions.":[119]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
