Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access.
Siddharth Prakash RaoSilke HoltmannsIan OliverTuomas AuraPublished in: TrustCom/BigDataSE/ISPA (1) (2015)
Keyphrases
- mobile devices
- physical location
- mobile environments
- hand held devices
- internet access
- mobile internet
- tablet computers
- context aware
- mobile phone
- smart phones
- mobile computing
- remote server
- maximum a posteriori
- location aware
- mobile users
- computing devices
- location based services
- mobile computing environment
- mobile learning
- information security
- countermeasures
- mobile networks
- mobile applications
- mobile services
- embedded devices
- learning experience
- wireless devices
- learning activities
- access control