Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging

Chunyi Peng, Chi-Yu Li, Hongyi Wang, Guan-Hua Tu, Songwu Lu. Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging. In Gail-Joon Ahn, Moti Yung, Ninghui Li, editors, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014. pages 727-738, ACM, 2014. [doi]

@inproceedings{PengLWTL14,
  title = {Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging},
  author = {Chunyi Peng and Chi-Yu Li and Hongyi Wang and Guan-Hua Tu and Songwu Lu},
  year = {2014},
  doi = {10.1145/2660267.2660346},
  url = {http://doi.acm.org/10.1145/2660267.2660346},
  researchr = {https://researchr.org/publication/PengLWTL14},
  cites = {0},
  citedby = {0},
  pages = {727-738},
  booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  editor = {Gail-Joon Ahn and Moti Yung and Ninghui Li},
  publisher = {ACM},
  isbn = {978-1-4503-2957-6},
}