{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T07:11:20Z","timestamp":1725779480547},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1145\/3643833.3656125","type":"proceedings-article","created":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T23:25:07Z","timestamp":1716247507000},"page":"248-253","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Random Access Failure Attack on Cellular Networks: Forcing Timing Advance Misalignment"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0009-0001-3494-0039","authenticated-orcid":false,"given":"Edward","family":"Kwao","sequence":"first","affiliation":[{"name":"George Mason University, Virginia, USA"}]},{"ORCID":"http:\/\/orcid.org\/0009-0003-3085-1666","authenticated-orcid":false,"given":"Jaehun","family":"Lee","sequence":"additional","affiliation":[{"name":"The Affiliated Institute of ETRI, Daejeon, Republic of Korea"}]},{"ORCID":"http:\/\/orcid.org\/0009-0008-7105-1450","authenticated-orcid":false,"given":"Jinmo","family":"Park","sequence":"additional","affiliation":[{"name":"The Affiliated Institute of ETRI, Daejeon, Republic of Korea"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2474-1711","authenticated-orcid":false,"given":"Byeongdo","family":"Hong","sequence":"additional","affiliation":[{"name":"The Affiliated Institute of ETRI, Daejeon, Republic of Korea"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9353-118X","authenticated-orcid":false,"given":"Taehoon","family":"Kim","sequence":"additional","affiliation":[{"name":"Hanbat National University, Daejeon, Republic of Korea"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7109-1999","authenticated-orcid":false,"given":"Inkyu","family":"Bang","sequence":"additional","affiliation":[{"name":"Hanbat National University, Daejeon, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2024,5,27]]},"reference":[{"volume-title":"Evolved Universal Terrestrial Radio Access (E-UTRA)","author":"Project Generation Partnership","key":"e_1_3_2_1_1_1","unstructured":"3rd Generation Partnership Project. 2023. Evolved Universal Terrestrial Radio Access (E-UTRA); Base Station (BS) radio transmission and reception."},{"volume-title":"Evolved Universal Terrestrial Radio Access (E-UTRA)","author":"Project Generation Partnership","key":"e_1_3_2_1_2_1","unstructured":"3rd Generation Partnership Project. 2023. Evolved Universal Terrestrial Radio Access (E-UTRA); Medium Access Control (MAC) protocol specification."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3152403"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2951818"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560525"},{"key":"e_1_3_2_1_6_1","volume-title":"The Mobile Economy","author":"GSM Association","year":"2022","unstructured":"GSM Association. 2022. The Mobile Economy 2022. Retrieved February 9, 2024 from https:\/\/www.gsma.com\/mobileeconomy\/wp-content\/uploads\/2022\/02\/280222-The-Mobile-Economy-2022.pdf"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceeding of 31st USENIX Security Symposium. 1291--1306","author":"Kotuliak Martin","year":"2022","unstructured":"Martin Kotuliak, Simon Erni, Patrick Leu, Marc Roeschlin, and Srdjan Capkun. 2022. LTrack: Stealthy tracking of mobile phones in LTE. In Proceeding of 31st USENIX Security Symposium. 1291--1306."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"James Long and John Roth. 2019. A Novel Denial of Service Vulnerability in Long Term Evolution Cellular Networks. (2019).","DOI":"10.24251\/HICSS.2019.905"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2656470"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00006"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of 20th USENIX Security Symposium. 73--88","author":"Rupprecht David","year":"2020","unstructured":"David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina P\u00f6pper. 2020. Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE. In Proceedings of 20th USENIX Security Symposium. 73--88."},{"volume-title":"LTE-the UMTS long term evolution: from theory to practice","author":"Sesia Stefania","key":"e_1_3_2_1_12_1","unstructured":"Stefania Sesia, Issam Toufik, and Matthew Baker. 2011. LTE-the UMTS long term evolution: from theory to practice. John Wiley & Sons."}],"event":{"name":"WiSec '24: 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Seoul Republic of Korea","acronym":"WiSec '24"},"container-title":["Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643833.3656125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T10:28:29Z","timestamp":1719484109000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643833.3656125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":12,"alternative-id":["10.1145\/3643833.3656125","10.1145\/3643833"],"URL":"https:\/\/doi.org\/10.1145\/3643833.3656125","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]},"assertion":[{"value":"2024-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}