{"id":"https://openalex.org/W2537607123","doi":"https://doi.org/10.1145/2976749.2978393","title":"New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks","display_name":"New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2537607123","doi":"https://doi.org/10.1145/2976749.2978393","mag":"2537607123"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978393","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978393","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006027092","display_name":"Guan-Hua Tu","orcid":"https://orcid.org/0000-0002-2542-4817"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Guan-Hua Tu","raw_affiliation_strings":["Michigan State University, East Lansing, MI, USA"],"affiliations":[{"raw_affiliation_string":"Michigan State University, East Lansing, MI, USA","institution_ids":["https://openalex.org/I87216513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101531317","display_name":"Chi-Yu Li","orcid":"https://orcid.org/0000-0002-1077-6801"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chi-Yu Li","raw_affiliation_strings":["National Chiao Tung University, Hsinchu City, Taiwan Roc"],"affiliations":[{"raw_affiliation_string":"National Chiao Tung University, Hsinchu City, Taiwan Roc","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028740131","display_name":"Chunyi Peng","orcid":"https://orcid.org/0000-0002-2361-2224"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chunyi Peng","raw_affiliation_strings":["Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101497980","display_name":"Yuanjie Li","orcid":"https://orcid.org/0000-0001-5931-3894"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuanjie Li","raw_affiliation_strings":["University of California, Los Angeles, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Los Angeles, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I161318765"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020188879","display_name":"Songwu Lu","orcid":"https://orcid.org/0000-0003-3779-0918"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Songwu Lu","raw_affiliation_strings":["University of California, Los Angeles, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Los Angeles, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I161318765"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5006027092"],"corresponding_institution_ids":["https://openalex.org/I87216513"],"apc_list":null,"apc_paid":null,"fwci":2.8057,"has_fulltext":false,"cited_by_count":50,"citation_normalized_percentile":{"value":0.91721465,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1118","last_page":"1130"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7116606831550598},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7009434103965759},{"id":"https://openalex.org/keywords/spamming","display_name":"Spamming","score":0.6851032376289368},{"id":"https://openalex.org/keywords/short-message-service","display_name":"Short Message Service","score":0.6476691961288452},{"id":"https://openalex.org/keywords/sms-banking","display_name":"SMS banking","score":0.5047320127487183},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.49996352195739746},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.46384671330451965},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.4604533314704895},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4591069221496582},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.45092979073524475},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4433422386646271},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4174352288246155},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3859592080116272},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24210619926452637},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.18911141157150269},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.11804530024528503},{"id":"https://openalex.org/keywords/mobile-banking","display_name":"Mobile banking","score":0.11502838134765625}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7116606831550598},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7009434103965759},{"id":"https://openalex.org/C158955206","wikidata":"https://www.wikidata.org/wiki/Q83058","display_name":"Spamming","level":3,"score":0.6851032376289368},{"id":"https://openalex.org/C74558129","wikidata":"https://www.wikidata.org/wiki/Q43024","display_name":"Short Message Service","level":2,"score":0.6476691961288452},{"id":"https://openalex.org/C37703655","wikidata":"https://www.wikidata.org/wiki/Q4048808","display_name":"SMS banking","level":3,"score":0.5047320127487183},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.49996352195739746},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.46384671330451965},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.4604533314704895},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4591069221496582},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.45092979073524475},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4433422386646271},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4174352288246155},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3859592080116272},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24210619926452637},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.18911141157150269},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.11804530024528503},{"id":"https://openalex.org/C2775930393","wikidata":"https://www.wikidata.org/wiki/Q1941439","display_name":"Mobile banking","level":2,"score":0.11502838134765625},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2978393","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978393","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.699999988079071}],"awards":[{"id":"https://openalex.org/G3253190392","display_name":null,"funder_award_id":"CNS-1421933 CNS-1422835 CNS-1528122 and CNS-1527613","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W417364168","https://openalex.org/W1531765245","https://openalex.org/W1566784204","https://openalex.org/W1577636146","https://openalex.org/W1592966710","https://openalex.org/W1891884073","https://openalex.org/W1979293059","https://openalex.org/W1984845499","https://openalex.org/W1998063700","https://openalex.org/W2008934589","https://openalex.org/W2010579408","https://openalex.org/W2013109736","https://openalex.org/W2014199851","https://openalex.org/W2016763420","https://openalex.org/W2023269223","https://openalex.org/W2028494203","https://openalex.org/W2054535568","https://openalex.org/W2054854728","https://openalex.org/W2070518775","https://openalex.org/W2093972407","https://openalex.org/W2120900307","https://openalex.org/W2123382811","https://openalex.org/W2129281072","https://openalex.org/W2139261958","https://openalex.org/W2159342279","https://openalex.org/W2162446888","https://openalex.org/W2187201788","https://openalex.org/W2508482518","https://openalex.org/W2963061006","https://openalex.org/W3103728711"],"related_works":["https://openalex.org/W2492910442","https://openalex.org/W3127778980","https://openalex.org/W2255926860","https://openalex.org/W2901744059","https://openalex.org/W2084733609","https://openalex.org/W4387799680","https://openalex.org/W4224903948","https://openalex.org/W2244604387","https://openalex.org/W2312782076","https://openalex.org/W2347575777"],"abstract_inverted_index":{"SMS":[0,42,81,84,86,88,92,99],"(Short":[1],"Messaging":[2],"Service)":[3],"is":[4,18],"a":[5],"text":[6,15],"messaging":[7],"service":[8],"for":[9],"mobile":[10,27,36,134],"users":[11],"to":[12,22,49,78,108,145],"exchange":[13],"short":[14],"messages.":[16],"It":[17],"also":[19],"widely":[20],"used":[21],"provide":[23],"SMS-powered":[24,104,139],"services":[25],"(e.g.,":[26],"banking).":[28],"With":[29],"the":[30,38,45,50,64,67,125,129,146],"rapid":[31],"deployment":[32],"of":[33,41,66],"all-IP":[34],"4G":[35],"networks,":[37,137],"underlying":[39],"technology":[40],"evolves":[43],"from":[44,128],"legacy":[46],"circuit-switched":[47],"network":[48,113],"IMS":[51],"(IP":[52],"Multimedia":[53],"Subsystem)":[54],"system":[55],"over":[56],"packet-switched":[57],"network.":[58],"In":[59],"this":[60],"work,":[61],"we":[62],"study":[63],"insecurity":[65],"IMS-based":[68],"SMS.":[69],"We":[70,94,141],"uncover":[71],"its":[72],"security":[73,131,148],"vulnerabilities":[74],"and":[75,91,118,138],"exploit":[76],"them":[77],"devise":[79],"four":[80],"attacks:":[82,111],"silent":[83],"abuse,":[85],"spoofing,":[87],"client":[89],"DoS,":[90],"spamming.":[93],"further":[95],"discover":[96],"that":[97,124],"those":[98],"threats":[100],"can":[101],"propagate":[102],"towards":[103],"services,":[105],"thereby":[106],"leading":[107],"three":[109],"malicious":[110],"social":[112],"account":[114],"hijacking,":[115],"unauthorized":[116,119],"donation,":[117],"subscription.":[120],"Our":[121],"analysis":[122],"reveals":[123],"problems":[126],"stem":[127],"loose":[130],"regulations":[132],"among":[133],"phones,":[135],"carrier":[136],"services.":[140],"finally":[142],"propose":[143],"remedies":[144],"identified":[147],"issues.":[149]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":3}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
