New privacy issues in mobile telephony: fix and verification

M Arapinis, L Mancini, E Ritter, M Ryan… - Proceedings of the …, 2012 - dl.acm.org
Mobile telephony equipment is daily carried by billions of subscribers everywhere they go.
Avoiding linkability of subscribers by third parties, and protecting the privacy of those …

A survey of subscription privacy on the 5G radio interface-the past, present and future

H Khan, KM Martin - Journal of Information Security and Applications, 2020 - Elsevier
End-user privacy in mobile telephony systems is nowadays of great interest because of the
envisaged hyper-connectivity and the potential of the unprecedented services (virtual reality …

Privacy through pseudonymity in mobile telephony systems

M Arapinis, LI Mancini, E Ritter… - 2014 Network and …, 2014 - research.ed.ac.uk
To protect mobile phone from tracking by third parties, mobile telephony systems rely on
periodically changing pseudonyms. We experimentally and formally analyse the mechanism …

A formal analysis of 5G authentication

D Basin, J Dreier, L Hirschi, S Radomirovic… - Proceedings of the …, 2018 - dl.acm.org
Mobile communication networks connect much of the world's population. The security of
users' calls, SMSs, and mobile data depends on the guarantees provided by the …

Mobile private contact discovery at scale

D Kales, C Rechberger, T Schneider… - 28th USENIX Security …, 2019 - usenix.org
Mobile messengers like WhatsApp perform contact discovery by uploading the user's entire
address book to the service provider. This allows the service provider to determine which of …

Analysing unlinkability and anonymity using the applied pi calculus

M Arapinis, T Chothia, E Ritter… - 2010 23rd IEEE computer …, 2010 - ieeexplore.ieee.org
An attacker that can identify messages as coming from the same source, can use this
information to build up a picture of targets' behaviour, and so, threaten their privacy. In …

{MPInspector}: A systematic and automatic approach for evaluating the security of {IoT} messaging protocols

Q Wang, S Ji, Y Tian, X Zhang, B Zhao, Y Kan… - 30th USENIX Security …, 2021 - usenix.org
Facilitated by messaging protocols (MP), many home devices are connected to the Internet,
bringing convenience and accessibility to customers. However, most deployed MPs on IoT …

Private discovery of common social contacts

E De Cristofaro, M Manulis, B Poettering - International journal of …, 2013 - Springer
Digital services that are offered, and consumed, on the basis of social relationships form the
backbone of social clouds—an emerging new concept that finds its roots in online social …

5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol

SR Hussain, M Echeverria, I Karim… - Proceedings of the …, 2019 - dl.acm.org
The paper proposes 5GReasoner, a framework for property-guided formal verification of
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …

A method for verifying privacy-type properties: the unbounded case

L Hirschi, D Baelde, S Delaune - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
In this paper, we consider the problem of verifying anonymity and unlinkability in the
symbolic model, where protocols are represented as processes in a variant of the applied pi …