{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:41:36Z","timestamp":1730328096276,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T00:00:00Z","timestamp":1716940800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2246050","CNS-2246051","CNS- 2321416"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100020595","name":"National Science and Technology Council","doi-asserted-by":"publisher","award":["110-2221-E-A49-031-MY3","112-2628-E-A49-016-MY3","112-2218-E-A49-021","112-2634-FA49- 001-MBK","112-2218-E-A49-023"],"id":[{"id":"10.13039\/100020595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,29]]},"DOI":"10.1145\/3636534.3649377","type":"proceedings-article","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T13:32:55Z","timestamp":1716989575000},"page":"513-527","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["IMS is Not That Secure on Your 5G\/4G Phones"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9635-7551","authenticated-orcid":false,"given":"Jingwen","family":"Shi","sequence":"first","affiliation":[{"name":"Michigan State University, East Lansing, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0565-7223","authenticated-orcid":false,"given":"Sihan","family":"Wang","sequence":"additional","affiliation":[{"name":"Michigan State University, East Lansing, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5059-2302","authenticated-orcid":false,"given":"Min-Yue","family":"Chen","sequence":"additional","affiliation":[{"name":"Michigan State University, East Lansing, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2542-4817","authenticated-orcid":false,"given":"Guan-Hua","family":"Tu","sequence":"additional","affiliation":[{"name":"Michigan State University, East Lansing, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1309-6091","authenticated-orcid":false,"given":"Tian","family":"Xie","sequence":"additional","affiliation":[{"name":"Utah State University, Logan, USA"}]},{"ORCID":"http:\/\/orcid.org\/0009-0004-0265-7548","authenticated-orcid":false,"given":"Man-Hsin","family":"Chen","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8790-5579","authenticated-orcid":false,"given":"Yiwen","family":"Hu","sequence":"additional","affiliation":[{"name":"Michigan State University, East Lansing, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1077-6801","authenticated-orcid":false,"given":"Chi-Yu","family":"Li","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2945-4981","authenticated-orcid":false,"given":"Chunyi","family":"Peng","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,5,29]]},"reference":[{"volume-title":"https:\/\/www.demandsage.com\/android-statistics\/","year":"2023","key":"e_1_3_2_1_1_1","unstructured":"20 android statistics in 2024 (market share and users). https:\/\/www.demandsage.com\/android-statistics\/, 2023."},{"volume-title":"https:\/\/www.justice.gov\/archives\/jm\/criminal-resource-manual-1050-scope-18-usc-2511-prohibitions","year":"2020","author":"Call Recording Law Federal Phone","key":"e_1_3_2_1_2_1","unstructured":"Federal Phone Call Recording Law. https:\/\/www.justice.gov\/archives\/jm\/criminal-resource-manual-1050-scope-18-usc-2511-prohibitions, 2020."},{"volume-title":"https:\/\/docs.srsran.com\/projects\/4g\/en\/latest\/app_notes\/source\/zeromq\/source\/index.html#zeromq-appnote","year":"2023","key":"e_1_3_2_1_3_1","unstructured":"srsran 4g with zmq virtual radios. https:\/\/docs.srsran.com\/projects\/4g\/en\/latest\/app_notes\/source\/zeromq\/source\/index.html#zeromq-appnote, 2023."},{"key":"e_1_3_2_1_4_1","unstructured":"tc-fw(8) --- Linux manual page. https:\/\/man7.org\/linux\/man-pages\/man8\/tc-fw.8.html ."},{"volume-title":"Jan","year":"2024","key":"e_1_3_2_1_5_1","unstructured":"Kingroot. https:\/\/kingrootapp.net\/, Jan 2024."},{"volume-title":"Overall high level functionality and architecture impacts of flow based charging","year":"2007","author":"GPP. TS","key":"e_1_3_2_1_6_1","unstructured":"3GPP. TS 23.125: Overall high level functionality and architecture impacts of flow based charging; Stage 2 (Release 7), Jun. 2007. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=790."},{"volume-title":"Nov.","year":"2018","author":"GPP.","key":"e_1_3_2_1_7_1","unstructured":"3GPP. TS33.328: IP Multimedia Subsystem (IMS) media plane security, Nov. 2018. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2295."},{"volume-title":"Nov.","year":"2019","author":"GPP.","key":"e_1_3_2_1_8_1","unstructured":"3GPP. TS24.011: Point-to-Point (PP) Short Message Service (SMS) support on mobile radio interface, Nov. 2019. https:\/\/www.etsi.org\/deliver\/etsi_ts\/124000_124099\/124011\/15.03.00_60\/ts_124011v150300p.pdf."},{"volume-title":"Mar.","year":"2021","author":"GPP. TS","key":"e_1_3_2_1_9_1","unstructured":"3GPP. TS 23.203: Policy and charging control architecture, Mar. 2021. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=810."},{"volume-title":"Apr.","year":"2022","author":"GPP. TS","key":"e_1_3_2_1_10_1","unstructured":"3GPP. TS 26.139: Real-time Transport Protocol (RTP) \/ RTP Control Protocol (RTCP) verification procedures (Release 17), Apr. 2022. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3709."},{"volume-title":"IP Multimedia (IM) Subsystem Cx and Dx Interfaces","year":"2022","author":"GPP. TS","key":"e_1_3_2_1_11_1","unstructured":"3GPP. TS 29.228: IP Multimedia (IM) Subsystem Cx and Dx Interfaces; Signalling flows and message contents, Mar. 2022. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=1681."},{"volume-title":"3G security","year":"2022","author":"GPP. TS","key":"e_1_3_2_1_12_1","unstructured":"3GPP. TS 33.102: 3G security; Security architecture, March 2022. V17.0.0."},{"volume-title":"3G security","year":"2022","author":"GPP. TS","key":"e_1_3_2_1_13_1","unstructured":"3GPP. TS 33.203: 3G security; Access security for IP-based services (Release 17), Mar. 2022. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=1055."},{"volume-title":"Network Domain Security (NDS)","year":"2022","author":"GPP. TS","key":"e_1_3_2_1_14_1","unstructured":"3GPP. TS 33.210: Network Domain Security (NDS); IP network layer security, Sep. 2022. V17.1.0."},{"volume-title":"3GPP System Architecture Evolution (SAE)","year":"2022","author":"GPP. TS","key":"e_1_3_2_1_15_1","unstructured":"3GPP. TS 33.401: 3GPP System Architecture Evolution (SAE); Security architecture (Release 17), Sep. 2022. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2296."},{"volume-title":"Mar.","year":"2022","author":"GPP. TS","key":"e_1_3_2_1_16_1","unstructured":"3GPP. TS 33.501: Security architecture and procedures for 5G System (Release 18), Mar. 2022. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3169."},{"volume-title":"IP Multimedia Subsystem (IMS)","year":"2023","author":"GPP. TS","key":"e_1_3_2_1_17_1","unstructured":"3GPP. TS 23.228: IP Multimedia Subsystem (IMS); Stage 2 (Release 18), Mar. 2023. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3100."},{"volume-title":"Mobile radio interface Layer 3 specification","year":"2023","author":"GPP. TS","key":"e_1_3_2_1_18_1","unstructured":"3GPP. TS 24.008: Mobile radio interface Layer 3 specification; Core network protocols; Stage 3 (Release 18), Apr. 2023. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=1015."},{"volume-title":"IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP)","year":"2023","author":"GPP. TS","key":"e_1_3_2_1_19_1","unstructured":"3GPP. TS 24.229: IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); Stage 3 (Release 18), Apr. 2023. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=1055."},{"volume-title":"Support of SMS over IP networks","year":"2023","author":"GPP. TS","key":"e_1_3_2_1_20_1","unstructured":"3GPP. TS 24.341: Support of SMS over IP networks; Stage 3 (Release 18), Jan. 2023. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=1085."},{"volume-title":"Sep.","year":"2004","key":"e_1_3_2_1_21_1","unstructured":"3GPP2. 3GPP2 C.S0015-A: Short Message Service (SMS) for Wideband Spread Spectrum Systems Release A, Sep. 2004. https:\/\/www.3gpp2.org\/Public_html\/Specs\/C.S0015-A_v2.0_051006.pdf."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274753"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3568000"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/RASSE53195.2021.9686840"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241573"},{"volume-title":"Android security paper","year":"2023","key":"e_1_3_2_1_26_1","unstructured":"Google. Android security paper 2023. https:\/\/blog.google\/products\/android-enterprise\/android-security-paper-2023\/, Jan 2023."},{"volume-title":"Oct.","year":"2019","author":"GSMA.","key":"e_1_3_2_1_27_1","unstructured":"GSMA. RCS Universal Profile Service Definition Document, Oct. 2019. https:\/\/www.gsma.com\/futurenetworks\/wp-content\/uploads\/2019\/10\/RCC.71-v2.4.pdf."},{"volume-title":"IMS Profile for Voice and SMS. https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/IR.92-v15.0-4.pdf","year":"2020","author":"GSMA.","key":"e_1_3_2_1_28_1","unstructured":"GSMA. IMS Profile for Voice and SMS. https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/IR.92-v15.0-4.pdf, 2020."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560534"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813718"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326082"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813618"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3380885"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102422"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8415"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.070813.00214"},{"volume-title":"Jan","year":"2024","key":"e_1_3_2_1_37_1","unstructured":"Qualcomm. Qxdm professional tool quick start. https:\/\/www.qualcomm.com\/content\/dam\/qcomm-martech\/dm-assets\/documents\/80-n9471-1_d_qxdm_professional_tool_quick_start.pdf, Jan 2024."},{"volume-title":"Jan","year":"2024","author":"Research Juniper","key":"e_1_3_2_1_38_1","unstructured":"Juniper Research. Video calling demand booms during pandemic. https:\/\/pipelinepub.com\/news\/12307, Jan 2024."},{"key":"e_1_3_2_1_39_1","unstructured":"RFC. Internet Protocol 1981. https:\/\/datatracker.ietf.org\/doc\/html\/rfc791."},{"volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium, SEC'20, USA","year":"2020","author":"Rupprecht David","key":"e_1_3_2_1_40_1","unstructured":"David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina P\u00f6pper. Call me maybe: eavesdropping encrypted lte calls with revolte. In Proceedings of the 29th USENIX Conference on Security Symposium, SEC'20, USA, 2020. USENIX Association."},{"volume-title":"Jan","year":"2023","author":"RAN.","key":"e_1_3_2_1_41_1","unstructured":"srsRAN. srsue. https:\/\/docs.srsran.com\/projects\/4g\/en\/latest\/usermanuals\/source\/srsue\/source\/1_ue_intro.html, Jan 2023."},{"issue":"7","key":"e_1_3_2_1_42_1","first-page":"1327","article-title":"A sip flooding attack detection scheme with the internal and external detection features in ims networks","volume":"17","author":"Sun Qibo","year":"2016","unstructured":"Qibo Sun, Shangguang Wang, Ning Lu, Kok-Seng Wong, and Myung Ho Kim. Sfads: A sip flooding attack detection scheme with the internal and external detection features in ims networks. Journal of Internet Technology, 17(7):1327--1338, 2016.","journal-title":"Journal of Internet Technology"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978393"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483239"},{"key":"e_1_3_2_1_45_1","unstructured":"Wikipedia. STIR\/SHAKEN. https:\/\/en.wikipedia.org\/wiki\/STIR\/SHAKEN ."},{"volume-title":"Feb","year":"2024","author":"Darwin","key":"e_1_3_2_1_46_1","unstructured":"Wikipedia. Darwin (operating system). https:\/\/en.wikipedia.org\/wiki\/Darwin_(operating_system), Feb 2024."},{"volume-title":"Jan","year":"2024","key":"e_1_3_2_1_47_1","unstructured":"Wikipedia. ios. https:\/\/www.apple.com\/iphone-15\/specs\/, Jan 2024."},{"volume-title":"Jan","year":"2024","key":"e_1_3_2_1_48_1","unstructured":"Wikipedia. Qualcomm msm interface. https:\/\/en.wikipedia.org\/wiki\/Qualcomm_MSM_Interface, Jan 2024."},{"volume-title":"Jan","year":"2024","key":"e_1_3_2_1_49_1","unstructured":"Wikipedia. Steganography. https:\/\/en.wikipedia.org\/wiki\/Steganography, Jan 2024."},{"volume-title":"Jan","year":"2024","author":"Magisk John Wu.","key":"e_1_3_2_1_50_1","unstructured":"John Wu. Magisk. https:\/\/github.com\/topjohnwu\/Magisk, Jan 2024."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433136"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2995509"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3141694"}],"event":{"name":"ACM MobiCom '24: 30th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Washington D.C. DC USA","acronym":"ACM MobiCom '24"},"container-title":["Proceedings of the 30th Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3636534.3649377","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3636534.3649377","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T16:13:27Z","timestamp":1716999207000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3636534.3649377"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,29]]},"references-count":53,"alternative-id":["10.1145\/3636534.3649377","10.1145\/3636534"],"URL":"http:\/\/dx.doi.org\/10.1145\/3636534.3649377","relation":{},"subject":[],"published":{"date-parts":[[2024,5,29]]},"assertion":[{"value":"2024-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}