Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android

Jethro Beekman, Christopher Thompson. Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android. In Jon Oberheide, William K. Robertson, editors, 7th USENIX Workshop on Offensive Technologies, WOOT '13, Washington, D.C., USA, August 13, 2013. USENIX Association, 2013. [doi]

Abstract

Abstract is missing.