{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T00:35:25Z","timestamp":1724978125753},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2246050","CNS-2246051","CNS-2321416"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100020950","name":"National Science and Technology Council","doi-asserted-by":"publisher","award":["110-2221-E-A49-031-MY3","112-2628-E-A49-016-MY3","112-2218-E-A49-021","112-2634-F-A49-001-MBK","112-2218-E-A49-023"],"id":[{"id":"10.13039\/501100020950","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1109\/tnet.2024.3379292","type":"journal-article","created":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T20:40:12Z","timestamp":1711485612000},"page":"3076-3091","source":"Crossref","is-referenced-by-count":0,"title":["Taming the Insecurity of Cellular Emergency Services (9\u20131-1): From Vulnerabilities to Secure Designs"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-5059-2302","authenticated-orcid":false,"given":"Min-Yue","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8790-5579","authenticated-orcid":false,"given":"Yiwen","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2542-4817","authenticated-orcid":false,"given":"Guan-Hua","family":"Tu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1077-6801","authenticated-orcid":false,"given":"Chi-Yu","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0565-7223","authenticated-orcid":false,"given":"Sihan","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9635-7551","authenticated-orcid":false,"given":"Jingwen","family":"Shi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1309-6091","authenticated-orcid":false,"given":"Tian","family":"Xie","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA"}]},{"given":"Ren-Chieh","family":"Hsu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"given":"Li","family":"Xiao","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2945-4981","authenticated-orcid":false,"given":"Chunyi","family":"Peng","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Purdue University, West Lafayette, IN, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0118-7917","authenticated-orcid":false,"given":"Zhaowei","family":"Tan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of California at Los Angeles, Los Angeles, CA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3779-0918","authenticated-orcid":false,"given":"Songwu","family":"Lu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of California at Los Angeles, Los Angeles, CA, USA"}]}],"member":"263","reference":[{"volume-title":"FCC 911 Regulations: 47 CFR Part 9: 911 Requirements","year":"2021","key":"ref1"},{"volume-title":"Emergency Communication (Version 1.0)","year":"2021","key":"ref2"},{"volume-title":"IP Multimedia Subsystem (IMS) Emergency Sessions (Release 17)","year":"2021","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2963856"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IWIA.2006.19"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86586-3_3"},{"issue":"3","key":"ref7","first-page":"29","article-title":"CAPTCHA-based DDoS defense system of call centers against zombie smart-phone","volume":"6","author":"Jung","year":"2012","journal-title":"Int. J. Secur. Appl."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368333"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5121\/ijngn.2010.2101"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2007.358952"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5383\/JUSPN.12.01.001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326082"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23313"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3466625"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382220"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660346"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346856"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813618"},{"first-page":"55","article-title":"Hiding in plain signal: Physical signal overshadowing attack on LTE","volume-title":"Proc. USENIX Security","author":"Yang","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00038"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3568000"},{"volume-title":"Service Aspects; Service Principles (Release 17)","year":"2023","key":"ref22"},{"volume-title":"General Packet Radio Service (GPRS) Enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) Access (Release 17)","year":"2021","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483239"},{"volume-title":"Non-Access-Stratum (NAS) Protocol for Evolved Packet System (EPS); Stage 3 (Release 17)","year":"2021","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3261"},{"volume-title":"IP Multimedia Subsystem (IMS); Stage 2 (Release 17)","year":"2021","key":"ref27"},{"volume-title":"IMS Profile for Voice and SMS (Version 15.0)","year":"2020","key":"ref28"},{"volume-title":"SMS Evolution (Version 2.0)","year":"2020","key":"ref29"},{"volume-title":"IP Multimedia Call Control Protocol Based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); Stage 3 (Release 17)","year":"2021","key":"ref30"},{"volume-title":"Get the srsRAN Software and Documentation","year":"2022","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14217\/9781848597150-15-en"},{"volume-title":"System Architecture for the 5G System (5GS) (Release 17)","year":"2021","key":"ref33"},{"volume-title":"Access Security for IP-based Services (Release 17)","year":"2021","key":"ref34"},{"volume-title":"For Smartphones, Tablets and Desktop Platforms","year":"2020","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3558482.3590196"},{"volume-title":"Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol Specification (Release 17)","year":"2022","key":"ref37"},{"volume-title":"Non-Access-Stratum (NAS) Protocol for 5G System (5GS); Stage 3 (Release 17)","year":"2021","key":"ref38"},{"volume-title":"Universal Mobile Telecommunications System (UMTS); Network Architecture (Release 5)","year":"2003","key":"ref39"},{"volume-title":"Policy and Charging Control (PCC); Reference Points (Release 17)","year":"2021","key":"ref40"},{"volume-title":"Policy and Charging Control Framework for the 5G System (5GS); Stage 2 (Release 17)","year":"2021","key":"ref41"},{"volume-title":"Rx Interface and Rx\/Gx Signalling Flows (Release 6)","year":"2007","key":"ref42"},{"volume-title":"Universal Mobile Telecommunications System (UMTS); LTE; 5G; Numbering, Addressing and Identification","year":"2022","key":"ref43"},{"volume-title":"Check IMEI Number to Get to Know Your Phone Better.","year":"2023","author":"INFO","key":"ref44"},{"volume-title":"IMEI Number Check","year":"2023","author":"com","key":"ref45"},{"volume-title":"Free U.S. Cell Phone IMEI Checker","year":"2023","author":"info","key":"ref46"},{"volume-title":"Tell Us About Your Device","year":"2023","key":"ref47"},{"volume-title":"Evolved Universal Terrestrial Radio Access (E-UTRA); Physical Layer Procedures (Release 17)","year":"2022","key":"ref48"},{"volume-title":"Google Voice Calling Rates","year":"2022","author":"Voice","key":"ref49"},{"volume-title":"How to Fix a Galaxy S9 That Reboots on Its Own During Calls","year":"2022","key":"ref50"},{"volume-title":"Shutting and Rebooting Down During Calls","year":"2015","key":"ref51"},{"volume-title":"IP Multimedia Subsystem (IMS); Multimedia Telephony; Media Handling and Interaction (Release 17)","year":"2021","key":"ref52"},{"volume-title":"Circuit Switched (CS) Fallback in Evolved Packet System (EPS); Stage 2 (Release 17)","year":"2021","key":"ref53"},{"volume-title":"Welcome to Open IMS Core\u2019s Homepage","year":"2008","author":"org","key":"ref54"},{"volume-title":"3GPP Evolved Packet System (EPS); Evolved General Packet Radio Service (GPRS) Tunnelling Protocol for Control Plane (GTPv2-C); Stage 3 (Release 17)","year":"2021","key":"ref55"},{"volume-title":"5G; Procedures for the 5G System (5GS)(Release 17)","year":"2021","key":"ref56"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.2196\/14383"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2185216.2185325"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/90\/10640200\/10479537-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/10640200\/10479537.pdf?arnumber=10479537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T19:47:25Z","timestamp":1724960845000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10479537\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":58,"journal-issue":{"issue":"4"},"URL":"http:\/\/dx.doi.org\/10.1109\/tnet.2024.3379292","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"type":"print","value":"1063-6692"},{"type":"electronic","value":"1558-2566"}],"subject":[],"published":{"date-parts":[[2024,8]]}}}