Comparison of caching strategies in modern cellular backhaul networks S Woo, E Jeong, S Park, J Lee, S Ihm, KS Park Proceeding of the 11th annual international conference on Mobile systems …, 2013 | 193 | 2013 |
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols R Borgaonkar, L Hirschi, S Park, A Shaik Proceedings on Privacy Enhancing Technologies 2019 (3), 108-127, 2019 | 150 | 2019 |
New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities A Shaik, R Borgaonkar, S Park, JP Seifert Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019 | 149 | 2019 |
BaseSAFE: baseband sanitized fuzzing through emulation D Maier, L Seidel, S Park Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 79 | 2020 |
On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks A Shaik, R Borgaonkar, S Park, JP Seifert Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018 | 49 | 2018 |
White-Stingray: Evaluating {IMSI} Catchers Detection Applications S Park, A Shaik, R Borgaonkar, A Martin, JP Seifert 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17), 2017 | 46 | 2017 |
FIRMWIRE: Transparent dynamic analysis for cellular baseband firmware G Hernandez, M Muench, D Maier, A Milburn, S Park, T Scharnowski, ... Network and Distributed Systems Security Symposium (NDSS) 2022, 2022 | 38 | 2022 |
Anatomy of Commercial IMSI Catchers and Detectors S Park, A Shaik, R Borgaonkar, JP Seifert Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 74-86, 2019 | 38 | 2019 |
Peeking over the Cellular Walled Gardens-A Method for Closed Network Diagnosis B Hong, S Park, H Kim, D Kim, H Hong, H Choi, JP Seifert, SJ Lee, Y Kim IEEE Transactions on Mobile Computing 17 (10), 2366-2380, 2018 | 33 | 2018 |
White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones S Park, A Shaik, R Borgaonkar, JP Seifert Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016 | 23 | 2016 |
A Post-Quantum Secure Subscription Concealed Identifier for 6G VQ Ulitzsch, S Park, S Marzougui, JP Seifert Proceedings of the 15th ACM Conference on Security and Privacy in Wireless …, 2022 | 16 | 2022 |
Practical Attacks on VoLTE and VoWIFI. ERNW Enno Rey Netzwerke S Chalakkal, H Schmidt, S Park Tech. Rep, 2017 | 5 | 2017 |
Why we cannot win: on fake base stations and their detection methods S Park Technische Universität Berlin, 2023 | 3 | 2023 |
Analyzing security of Korean USIM-based PKI certificate service S Park, S Park, I Yun, D Kim, Y Kim Information Security Applications: 15th International Workshop, WISA 2014 …, 2015 | 2 | 2015 |