{"id":"https://openalex.org/W4398131559","doi":"https://doi.org/10.1145/3643833.3656131","title":"Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services","display_name":"Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services","publication_year":2024,"publication_date":"2024-05-20","ids":{"openalex":"https://openalex.org/W4398131559","doi":"https://doi.org/10.1145/3643833.3656131"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3643833.3656131","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101748553","display_name":"Yaru Yang","orcid":"https://orcid.org/0009-0009-7410-3225"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaru Yang","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070997167","display_name":"Yiming Zhang","orcid":"https://orcid.org/0000-0002-6774-5299"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiming Zhang","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065227102","display_name":"Tao Wan","orcid":"https://orcid.org/0000-0001-7732-8774"},"institutions":[{"id":"https://openalex.org/I188497080","display_name":"Carleton College","ror":"https://ror.org/03jep7677","country_code":"US","type":"education","lineage":["https://openalex.org/I188497080"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tao Wan","raw_affiliation_strings":["CableLabs & Carleton University, Louisville, USA"],"affiliations":[{"raw_affiliation_string":"CableLabs & Carleton University, Louisville, USA","institution_ids":["https://openalex.org/I188497080"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101494594","display_name":"Chuhan Wang","orcid":"https://orcid.org/0000-0003-4715-4667"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuhan Wang","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067799841","display_name":"Haixin Duan","orcid":"https://orcid.org/0000-0003-0083-733X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haixin Duan","raw_affiliation_strings":["Tsinghua University & Quancheng Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University & Quancheng Laboratory, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041795098","display_name":"Jianjun Chen","orcid":"https://orcid.org/0000-0001-7511-1117"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianjun Chen","raw_affiliation_strings":["Tsinghua University & Zhongguancun Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University & Zhongguancun Laboratory, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061569630","display_name":"Yishen Li","orcid":"https://orcid.org/0009-0003-9898-190X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yishen Li","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.555,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.886497,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":92},"biblio":{"volume":null,"issue":null,"first_page":"265","last_page":"276"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9974,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9968,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.73560935},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.69026697},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.65993893},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.44914865},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3512672},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0916132}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3643833.3656131","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":34,"referenced_works":["https://openalex.org/W1984487609","https://openalex.org/W2135332490","https://openalex.org/W2139143222","https://openalex.org/W2150548134","https://openalex.org/W2234815946","https://openalex.org/W2239183242","https://openalex.org/W2288124299","https://openalex.org/W2470929368","https://openalex.org/W2496958569","https://openalex.org/W2508482518","https://openalex.org/W2537607123","https://openalex.org/W2580704160","https://openalex.org/W2612869182","https://openalex.org/W2752929869","https://openalex.org/W2809727329","https://openalex.org/W2906890170","https://openalex.org/W2914982603","https://openalex.org/W2932741641","https://openalex.org/W2946045894","https://openalex.org/W2947003210","https://openalex.org/W2987215725","https://openalex.org/W3003760462","https://openalex.org/W3046577719","https://openalex.org/W3095325295","https://openalex.org/W3172023548","https://openalex.org/W3188452751","https://openalex.org/W4210276473","https://openalex.org/W4210400661","https://openalex.org/W4229066873","https://openalex.org/W4230038347","https://openalex.org/W4236546623","https://openalex.org/W4242138061","https://openalex.org/W4281386965","https://openalex.org/W4309672247"],"related_works":["https://openalex.org/W96612179","https://openalex.org/W632915154","https://openalex.org/W4391375266","https://openalex.org/W4256492088","https://openalex.org/W4229499248","https://openalex.org/W2987774938","https://openalex.org/W2770234245","https://openalex.org/W2748952813","https://openalex.org/W2566006169","https://openalex.org/W1567818861"],"abstract_inverted_index":{"5G":[0,54,70,106,157],"messaging":[1,55,71,158],"services,":[2,72],"based":[3],"on":[4],"Global":[5],"System":[6],"for":[7,116,146],"Mobile":[8],"Communications":[9],"Association":[10],"(GSMA)":[11],"Rich":[12],"Communication":[13],"Service":[14],"(RCS)":[15],"and":[16,67,86,103,133,137,154],"3rd":[17],"Generation":[18],"Partnership":[19],"Project":[20],"(3GPP)":[21],"IP":[22],"Multimedia":[23],"Subsystem":[24],"(IMS),":[25],"have":[26],"been":[27],"deployed":[28],"globally":[29],"by":[30,74,90],"more":[31],"than":[32],"90":[33],"mobile":[34,134],"operators":[35],"serving":[36],"over":[37],"421":[38],"million":[39],"monthly":[40],"active":[41],"users":[42],"via":[43],"1.2":[44],"billion":[45],"devices.":[46,108],"Despite":[47],"the":[48,144],"widespread":[49],"use,":[50],"security":[51,65,148,151],"research":[52],"of":[53,69,99,101,113,120,156],"remains":[56],"sparse.":[57],"In":[58],"this":[59],"paper,":[60],"we":[61,79],"present":[62],"a":[63,75,117],"comprehensive":[64],"analysis":[66],"measurement":[68],"assisted":[73],"semi-automated":[76],"testing":[77,91],"tool":[78],"developed.":[80],"We":[81,109],"considered":[82],"both":[83],"carrier-side":[84],"deployment":[85,155],"phone-side":[87],"software":[88],"implementations":[89],"against":[92],"three":[93],"large":[94],"operators,":[95],"each":[96],"with":[97],"hundreds":[98],"millions":[100],"subscribers,":[102],"six":[104],"popular":[105],"messaging-enabled":[107],"uncovered":[110],"4":[111],"categories":[112],"vulnerabilities,":[114],"allowing":[115],"wide":[118],"range":[119],"attacks,":[121,125],"including":[122],"Man-In-The-Middle":[123],"(MITM)":[124],"zero-click":[126],"remote":[127],"information":[128],"leakage,":[129],"phone":[130],"storage":[131],"exhaustion":[132],"data":[135],"consumption,":[136],"Denial-of-Services":[138],"(DoS)":[139],"attacks.":[140],"Our":[141],"study":[142],"underscores":[143],"need":[145],"further":[147],"enhancements":[149],"in":[150],"specifications,":[152],"implementation,":[153],"services.":[159]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4398131559","counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-01-19T23:27:35.691727","created_date":"2024-05-21"}