Paper-Conference

Invade the Walled Garden: Evaluating GTP Security in Cellular Networks

Cellular backhaul and core networks have traditionally been considered as Walled Garden, with their security ensured by physical isolation. Therefore, prior security studies …

Yiming Zhang

Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services

5G messaging services, based on Global System for Mobile Communications Association (GSMA) Rich Communication Service (RCS) and 3rd Generation Partnership Project (3GPP) IP …

avatar
Yaru Yang

HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations.

The Internet has become a complex distributed network with numerous middle-boxes, where an end-to-end HTTP request is often processed by multiple intermediate servers before it …

Kaiwen Shen