作者
Hongil Kim, Dongkwan Kim, Minhee Kwon, Hyungseok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, Yongdae Kim
发表日期
2015/10/12
图书
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
页码范围
328-339
简介
Long Term Evolution (LTE) is becoming the dominant cellular networking technology, shifting the cellular network away from its circuit-switched legacy towards a packet-switched network that resembles the Internet. To support voice calls over the LTE network, operators have introduced Voice-over-LTE (VoLTE), which dramatically changes how voice calls are handled, both from user equipment and infrastructure perspectives. We find that this dramatic shift opens up a number of new attack surfaces that have not been previously explored. To call attention to this matter, this paper presents a systematic security analysis.
Unlike the traditional call setup, the VoLTE call setup is controlled and performed at the Application Processor (AP), using the SIP over IP. A legitimate user who has control over the AP can potentially control and exploit the call setup process to establish a VoLTE channel. This combined with the …
引用总数
201520162017201820192020202120222023202447116137131384
学术搜索中的文章
H Kim, D Kim, M Kwon, H Han, Y Jang, D Han, T Kim… - Proceedings of the 22nd ACM SIGSAC Conference on …, 2015