{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T07:11:12Z","timestamp":1725779472361},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The National Science Foundation","award":["2144914"]},{"name":"The Center for Cyber Security at New York University Abu Dhabi (NYUAD)"},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1145\/3643833.3656141","type":"proceedings-article","created":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T23:25:07Z","timestamp":1716247507000},"page":"89-100","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-7899-7339","authenticated-orcid":false,"given":"Syed","family":"Khandker","sequence":"first","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, UAE"}]},{"ORCID":"http:\/\/orcid.org\/0009-0005-9990-234X","authenticated-orcid":false,"given":"Michele","family":"Guerra","sequence":"additional","affiliation":[{"name":"University of Molise, Pesche, Italy"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7850-6867","authenticated-orcid":false,"given":"Evangelos","family":"Bitsikas","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1420-2987","authenticated-orcid":false,"given":"Roger Piqueras","family":"Jover","sequence":"additional","affiliation":[{"name":"Google, New York, NY, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0464-5861","authenticated-orcid":false,"given":"Aanjhan","family":"Ranganathan","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2814-962X","authenticated-orcid":false,"given":"Christina","family":"P\u00f6pper","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, UAE"}]}],"member":"320","published-online":{"date-parts":[[2024,5,27]]},"reference":[{"volume-title":"3rd Generation Partnership Project (3GPP). Version 17.9.0","author":"GPP.","key":"e_1_3_2_1_1_1","unstructured":"3GPP. 2023. 5G; Non-Access-Stratum (NAS) protocol for 5G System (5GS); Stage 3. 3rd Generation Partnership Project (3GPP). Version 17.9.0"},{"volume-title":"3rd Generation Partnership Project (3GPP). Version 17.8.0","author":"System GPP.","key":"e_1_3_2_1_2_1","unstructured":"3GPP. 2023. 5G; Security architecture and procedures for 5G System. 3rd Generation Partnership Project (3GPP). Version 17.8.0."},{"key":"e_1_3_2_1_3_1","unstructured":"5G America. 2020. Security considrations for the 5G era. https:\/\/www.5gamericas.org\/wp-content\/uploads\/2020\/07\/Security-Considerations-for-the-5G-Era-2020-WP-Lossless.pdf."},{"key":"e_1_3_2_1_4_1","unstructured":"Android. 2023. Android carrier list. https:\/\/android.googlesource.com\/platform\/packages\/providers\/TelephonyProvider\/\/refs\/heads\/main\/assets\/sdk33_carrier_id\/carrier_list.textpb."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Lina Bariah Hang Zou Qiyang Zhao Belkacem Mouhouche Faouzi Bader and Merouane Debbah. 2023. Understanding Telecom Language Through Large Language Models. arXiv:2306.07933","DOI":"10.36227\/techrxiv.23501271.v1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3558482.3590194"},{"key":"e_1_3_2_1_7_1","unstructured":"Open Cell. 2023. Commercial UEs tests. https:\/\/open-cells.com\/index.php\/2022\/07\/26\/ues."},{"key":"e_1_3_2_1_8_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Chen Yi","year":"2022","unstructured":"Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, Xiaofeng Wang, Xiaozhong Liu, Haixu Tang, and Dongfang Zhao. 2022. Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 17--34."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00104"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3324927"},{"key":"e_1_3_2_1_11_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv:1810.04805","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv:1810.04805"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--98989--1_2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001673"},{"key":"e_1_3_2_1_14_1","unstructured":"Genymobile. 2023. Scrcpy. https:\/\/github.com\/Genymobile\/scrcpy."},{"key":"e_1_3_2_1_15_1","unstructured":"Google. 2023. Google Bard. https:\/\/bard.google.com."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23136"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23313"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354263"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485388"},{"key":"e_1_3_2_1_20_1","volume-title":"Syed Md. Mukit Rashid, Ali Ranjbar, Kai Tu, Tianwei Wu, Zhezheng Song, Weixuan Wang, Mujtahid Akon, Rui Zhang, and Syed Rafiul Hussain.","author":"Ishtiaq Abdullah Al","year":"2023","unstructured":"Abdullah Al Ishtiaq, Sarkar Snigdha Sarathi Das, Syed Md. Mukit Rashid, Ali Ranjbar, Kai Tu, Tianwei Wu, Zhezheng Song, Weixuan Wang, Mujtahid Akon, Rui Zhang, and Syed Rafiul Hussain. 2023. Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications. arXiv:2310.04381"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3558482.3581774"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00079"},{"key":"e_1_3_2_1_23_1","volume-title":"Mirza Masfiqur Rahman, and Elisa Bertino.","author":"Karim Imtiaz","year":"2023","unstructured":"Imtiaz Karim, Kazi Samin Mubasshir, Mirza Masfiqur Rahman, and Elisa Bertino. 2023. SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis. arXiv:2301.09201"},{"key":"e_1_3_2_1_24_1","volume-title":"BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Kim Eunsoo","year":"2023","unstructured":"Eunsoo Kim, Min Woo Baek, CheolJun Park, Dongkwan Kim, Yongdae Kim, and Insu Yun. 2023. BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 3547--3563."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24365"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00038"},{"key":"e_1_3_2_1_27_1","volume-title":"Instructions Unclear: Undefined Behaviour in Cellular Network Specifications. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Klischies Daniel","year":"2023","unstructured":"Daniel Klischies, Moritz Schloegel, Tobias Scharnowski, Mikhail Bogodukhov, David Rupprecht, and Veelasha Moonsamy. 2023. Instructions Unclear: Undefined Behaviour in Cellular Network Specifications. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 3475--3492."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Manikanta Kotaru. 2023. Adapting Foundation Models for Information Synthesis of Wireless Communication Specifications. arXiv:2308.04033","DOI":"10.1145\/3626111.3628191"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399360"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/icABCD59051.2023.10220512"},{"key":"e_1_3_2_1_31_1","unstructured":"Meta. 2023. LLAMA 2. https:\/\/llama.meta.com."},{"key":"e_1_3_2_1_32_1","unstructured":"Open5gs. 2023. Open5gs. https:\/\/open5gs.org."},{"key":"e_1_3_2_1_33_1","unstructured":"OpenAI. 2023. OpenAI. https:\/\/openai.com."},{"key":"e_1_3_2_1_34_1","unstructured":"Osmocom. 2023. PySim. https:\/\/osmocom.org\/projects\/pysim\/wiki."},{"key":"e_1_3_2_1_35_1","volume-title":"DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices. In 31th USENIX Security Symposium (USENIX Security 22)","author":"Park CheolJun","year":"2022","unstructured":"CheolJun Park, Sangwook Bae, BeomSeok Oh, Jiho Lee, Eunkyu Lee, Insu Yun, and Yongdae Kim. 2022. DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices. In 31th USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 1325--1342."},{"key":"e_1_3_2_1_36_1","unstructured":"MinWoo Park. 2023. Bard API. https:\/\/github.com\/dsdanielpark\/Bard-API."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob52687.2021.9606317"},{"key":"e_1_3_2_1_38_1","volume-title":"USENIX Workshop on Offensive Technologies","author":"Rupprecht David","year":"2016","unstructured":"David Rupprecht, Kai Jansen, and Christina P\u00f6pper. 2016. Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness. In USENIX Workshop on Offensive Technologies (Austin, TX) (WOOT'16). USENIX Association, USA, 40--51."},{"key":"e_1_3_2_1_39_1","unstructured":"srsRAN. 2023. srsRAN. https:\/\/www.srsran.com."},{"key":"e_1_3_2_1_40_1","unstructured":"srsRAN. 2023. Tested COTS UEs. https:\/\/docs.srsran.com\/projects\/project\/en\/latest\/knowledge_base\/source\/cots_ues\/source\/index.html."},{"key":"e_1_3_2_1_41_1","unstructured":"Swind. 2020. Pure Python ADB. https:\/\/github.com\/Swind\/pure-python-adb."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24527"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103361"}],"event":{"name":"WiSec '24: 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Seoul Republic of Korea","acronym":"WiSec '24"},"container-title":["Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643833.3656141","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643833.3656141","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T10:27:30Z","timestamp":1719484050000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643833.3656141"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":43,"alternative-id":["10.1145\/3643833.3656141","10.1145\/3643833"],"URL":"https:\/\/doi.org\/10.1145\/3643833.3656141","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]},"assertion":[{"value":"2024-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}