Skip to main content

Showing 1–3 of 3 results for author: Mjølsnes, S F

Searching in archive cs. Search in all archives.
.
  1. arXiv:1807.11350  [pdf, other

    cs.CR

    Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging

    Authors: Christian Sørseth, Xianyu Shelley Zhou, Stig F. Mjølsnes, Ruxandra F. Olimid

    Abstract: Over the last years, considerable attention has been given to the privacy of individuals in wireless environments. Although significantly improved over the previous generations of mobile networks, LTE still exposes vulnerabilities that attackers can exploit. This might be the case of paging messages, wake-up notifications that target specific subscribers, and that are broadcasted in clear over the… ▽ More

    Submitted 30 July, 2018; originally announced July 2018.

  2. arXiv:1702.04434  [pdf, other

    cs.CR

    Easy 4G/LTE IMSI Catchers for Non-Programmers

    Authors: Stig F. Mjølsnes, Ruxandra F. Olimid

    Abstract: IMSI Catchers are tracking devices that break the privacy of the subscribers of mobile access networks, with disruptive effects to both the communication services and the trust and credibility of mobile network operators. Recently, we verified that IMSI Catcher attacks are really practical for the state-of-the-art 4G/LTE mobile systems too. Our IMSI Catcher device acquires subscription identities… ▽ More

    Submitted 14 February, 2017; originally announced February 2017.

  3. arXiv:cs/0611062  [pdf, ps, other

    cs.CR

    A framework for compositional verification of security protocols

    Authors: Suzana Andova, Cas Cremers, Kristian Gjosteen, Sjouke Mauw, Stig F. Mjolsnes, Sasa Radomirovic

    Abstract: Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysis is an attractive, but non-trivial approach. We have developed a framework for compositional analysis of a large class of security protocols. The framework is intended to facilitate automatic as well as manual verifi… ▽ More

    Submitted 1 May, 2007; v1 submitted 14 November, 2006; originally announced November 2006.