Showing results 1 to 3 of 3
GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier Hong, Byeongdo; Bae, Sangwook; Kim, Yongdae, 25th Annual Network and Distributed System Security Symposium (NDSS), NDSS, 2018-02 |
Pay As You Want: Bypassing Charging System in Operational Cellular Networks Hong, Hyunwook; Kim, Hongil; Hong, Byeongdo; Kim, Dongkwan; Choi, Hyunwoo; Lee, Eunkyu; Kim, Yongdae, 17th International Workshop on Information Security Applications (WISA), pp.148 - 160, Korea Institute of Information Security and Cryptology (KIISC), 2016-08-26 |
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks Hong, Hyunwook; Choi, Hyunwoo; Kim, Dongkwan; Kim, Hongil; Hong, Byeongdo; Noh, Jiseong; Kim, Yongdae, 2nd IEEE European Symposium on Security and Privacy (EuroS&P), pp.595, IEEE, 2017-04-02 |
Discover