Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android.
Jethro BeekmanChristopher ThompsonPublished in: WOOT (2013)
Keyphrases
- security mechanisms
- mobile devices
- information security
- biometric authentication
- user authentication
- e learning
- access control
- security issues
- fragile watermarking
- malware detection
- countermeasures
- smart phones
- identity authentication
- security vulnerabilities
- wifi
- mobile phone
- location aware
- security systems
- authentication scheme
- hand held devices
- authentication mechanism
- key distribution
- mobile applications
- android platform
- integrity verification