Bookworm game: Automatic discovery of lte vulnerabilities through documentation analysis

Y Chen, Y Yao, XF Wang, D Xu, C Yue… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
In the past decade, the security of cellular networks has been increasingly under scrutiny,
leading to the discovery of numerous vulnerabilities that expose the network and its users to …

Qoe doctor: Diagnosing mobile app qoe with automated ui control and cross-layer analysis

QA Chen, H Luo, S Rosen, ZM Mao, K Iyer… - Proceedings of the …, 2014 - dl.acm.org
Smartphones have become increasingly prevalent and important in our daily lives. To meet
users' expectations about the Quality of Experience (QoE) of mobile applications (apps), it is …

Insecurity of voice solution VoLTE in LTE mobile networks

CY Li, GH Tu, C Peng, Z Yuan, Y Li, S Lu… - Proceedings of the 22nd …, 2015 - dl.acm.org
VoLTE (Voice-over-LTE) is the designated voice solution to the LTE mobile network, and its
worldwide deployment is underway. It reshapes call services from the traditional circuit …

Breaking and fixing volte: Exploiting hidden data channels and mis-implementations

H Kim, D Kim, M Kwon, H Han, Y Jang, D Han… - Proceedings of the …, 2015 - dl.acm.org
Long Term Evolution (LTE) is becoming the dominant cellular networking technology,
shifting the cellular network away from its circuit-switched legacy towards a packet-switched …

Securacy: an empirical investigation of Android applications' network usage, privacy and security

D Ferreira, V Kostakos, AR Beresford… - Proceedings of the 8th …, 2015 - dl.acm.org
Smartphone users do not fully know what their apps do. For example, an applications'
network usage and underlying security configuration is invisible to users. In this paper we …

Control-plane protocol interactions in cellular networks

GH Tu, Y Li, C Peng, CY Li, H Wang, S Lu - ACM SIGCOMM Computer …, 2014 - dl.acm.org
Control-plane protocols are complex in cellular networks. They communicate with one
another along three dimensions of cross layers, cross (circuit-switched and packet-switched) …

TCP performance over mobile networks in high-speed mobility scenarios

Q Xiao, K Xu, D Wang, L Li… - 2014 IEEE 22nd …, 2014 - ieeexplore.ieee.org
Recently, the performance of mobile data networks has been evaluated from many aspects,
eg, TCP/IP protocols, comparison with WiFi or even satellite communication, under different …

{iCellular}:{Device-Customized} Cellular Network Access on Commodity Smartphones

Y Li, H Deng, C Peng, Z Yuan, GH Tu, J Li… - 13th USENIX Symposium …, 2016 - usenix.org
Exploiting multi-carrier access offers a promising direction to boost access quality in mobile
networks. However, our experiments show that, the current practice does not achieve the full …

Real threats to your data bills: Security loopholes and defenses in mobile data charging

C Peng, CY Li, H Wang, GH Tu, S Lu - Proceedings of the 2014 ACM …, 2014 - dl.acm.org
Secure mobile data charging (MDC) is critical to cellular network operations. It must charge
the right user for the right volume that (s) he authorizes to consume (ie, requirements of …

[PDF][PDF] Gaining control of cellular traffic accounting by spurious tcp retransmission.

Y Go, EY Jeong, J Won, Y Kim, DF Kune, KS Park - NDSS, 2014 - Citeseer
Packet retransmission is a fundamental TCP mechanism that ensures reliable data transfer
between two end nodes. Interestingly, when it comes to cellular data accounting, TCP …