References
- K. S. Lee, W. H. Seok, Y. K. Song (ETRI), "The Current Status and Prospect of the Femtocell Market," 2012.
- IT donga, "Jammed data traffic fixer, Femtocell," 2012 [Internet], http://it.donga.com/9540/.
- Borgaonkar, Ravishankar, Kevin Redon, and Jean-Pierre Seifert, "Security analysis of a femtocell device," Proceedings of the 4th International Conference on Security of Information and Networks, ACM, 2011.
- Alexey Osipov and Alexander Zaitsev, "ADVENTURES IN FEMTOLAND: 350 YUAN FOR INVALUABLE FUN," Black Hat Las Vegas (2015).
- Shostack, Adam, "Threat modeling: Designing for security," John Wiley & Sons, 2014.
- Loren Kohnfelder and Praerit Garg, "The threats to our products," 1999 [Internet], https://blogs.msdn.com/cfs-filesystemfile.ashx/__key/communityserver-components-postattachments/00-09-88-74-86/The-threats-to-our-products.docx.
- Microsoft, "The STRIDE Threat Model," 2005 [Internet], https://msdn.microsoft.com/en-us/library/ms954176.aspx.
- Carnegie Mellon University Software Engineering Institute, "Octave," 2001 [Internet], http://www.cert.org/resilience/products-services/octave/index.cfm.
- Schiffman Mike, et al., "The Common Vulnerability Scoring System," National Infrastructure Advisory Council, Vulnerability Disclosure Working Group, Vulnerability Scoring Subgroup (2004).
- Brenda Larcom and Eleanor Saitta, "Trike" [Internet], http://www.octotrike.org/.
- STANDARDS NEW ZEALNAD, "AS/NZS ISO 31000:2009," 2009 [Internet], http://shop.standards.co.nz/catalog/31000%3A2009%28AS%7CNZS+ISO%29/view.
- Tony UcedaVelez, Marco M. Morana. "Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis," John Wiley, 2015.
- Klockwork, "Threat Modeling for Secure Embedded Software," Security Innovation & Klockwork, White Paper, 2011.
- M. Deng, K. Wuyts et al., "A Privacy Threat Analysis Framework: Supporting the Elicitation and Fulfillment of Privacy Requirements," Journal of Requirements Engineering, Springer-Verlag, 2011.
- D. Parker, "Our Excessively Simplistic Information Security Model and How to Fix It," ISSA Journal, pp.12-21, July, 2010.
- Microsoft, "Evaluating Security Threats" [Internet], https://msdn.microsoft.com/en-us/library/ms172104(v=vs.80).aspx.
- DistriNet Research Group, "LINDDUN privacy threat modeling," 2014 [Internet], https://distrinet.cs.kuleuven.be/software/linddun/index.php.
- Deng, Mina et al. "A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements," Requirements Engineering, Vol.16, No.1 pp.3-32, 2011. https://doi.org/10.1007/s00766-010-0115-7
- Klocwork, "Threat Modeling for Secure Embedded Software," 2014 [Internet], http://www.klocwork.com/getattachment/bb113ce3-8930-484c-9762-3cc4ef904975/Threat-Modeling-for-Secure-Embedded-Software?sitename=Klocwork.
- CISCO, "Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2014-2019 White Paper," 2015 [Internet], http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white_paper_c11-520862.html.
- I. S. Hwang, "Ultra-compact smart solutions led by evolution wireless network 'Femtocell'," NETWORK TIMES, 2011.07.
- GSM Association, "Security Issues in HNB Deployment," Technical report, July, 2008.
- 3GPP, "Security of Home Node B (HNB) / Home evolved Node B (HeNB)," 3GPP TS 33.320 v9.5.0, Mar., 2011.
- R. Rajavelsamy, Jicheol Lee, and Sungho Choi, "Towards security architecture for Home (evolved) NodeB: challenges, requirements, and solutions," in Security and Communication Networks, pp.471-481, April, 2011, John Wiley & Sons Ltd. https://doi.org/10.1002/sec.155
- Chan-Kyu Han, Hyoung-Kee Choi, and In-Hwan Kim, "Building Femtocell More Secure with Improved Proxy Signature," in Proceedings of Global Telecommunications Conference, GLOBECOM 2009. IEEE, November, 2009.
- Borgaonkar, Ravishankar, and Kevin Redon, "Femtocell Security," 2010.
- Borgaonkar, Ravishankar, Kevin Redon, and Jean-pierre Seifert, "Experimental Analysis of the Femtocell Location Verification Techniques," in Proceedings of the 15th Nordic Conference in Secure IT Systems, (NordSec. 2010.).
- Borgaonkar, Ravishankar, Nico Golde, and Kevin Redon, "Femtocells: a Poisonous Needle in the Operator's Hay Stack," Black Hat Las Vegas, 2011.
- Golde Nico, Kevin Redon, and Ravishankar Borgaonkar, "Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications," NDSS, 2012.
- Faisal Bin Ubaid and Adil Yasin, "Brief Overview on Femtocell Architecture & its Threats," Journal of Information & Communication Technology, Vol.6, No.2, pp.27-32, Fall, 2012.
- Tom Ritter, Doug DePerry, and Andrew Rahimi, "I Can Hear You Now: Traffic Interception & Remote Mobile Phone Cloning," Black Hat Las Vegas, 2013.
- Alexey Osipov and Alexander Zaitsev, "ADVENTURES IN FEMTOLAND: 350 YUAN FOR INVALUABLE FUN," Black Hat Las Vegas, 2015.
- Yuwei Zheng and Haoqi Shan, "Build a free cellular traffic capture tool with a vxworks based femoto," DEFCON, 2015.
- Netmanias, "LTE Network Architecture," 2011 [Internet], http://www.netmanias.com/ko/post/blog/5344/lte-nrm/ltenetwork-architecture-network-reference-model.
- Netmanias, "Network Architecture for LTE and Wi-Fi Interworking," 2012 [Internet], http://www.netmanias.com/ko/?m=view&id=techdocs&no=5537.
- Information and communications technology glossary, "HO Hand-Off, Handoff, Handover," 2011 [Internet], http://www.ktword.co.kr/abbr_view.php?m_temp1=770.
- Hansol Inticube, "IPLS" [Internet], https://www.hansolinticube.com/mobile/sub03_ipls.html.
- CRESTEL, "Crestel CGF - Charging Gateway Function -Overview," [Internet], http://www.crestel.in/cgf-charginggateway-function.html.
- Information and communications technology glossary, "IMS (IP Multimedia Subsystem)" [Internet], http://www.ktword.co.kr/abbr_view.php?m_temp1=3238.
- Daniel Miessler, "IoT Attack Surfaces," DEFCON, 2015.
- Common Vulnerabilities and Exposures, "CVE-2013-2270" [Internet], https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2270.
- Brassil, Jack, et al., "Authenticating Location with Femtocells," submitted for publication, 2012.
- Arapinis, Myrto, et al., "New privacy issues in mobile telephony: fix and verification," Proceedings of the 2012 ACM Conference on Computer and Communications Security, ACM, 2012.
- The MITRE Corporation, "CAPEC CATEGORY: Software" [Internet], https://capec.mitre.org/data/definitions/513.html.
- The MITRE Corporation, "CAPEC CATEGORY: Hardware" [Internet], https://capec.mitre.org/data/definitions/515.html.
- OWASP, "OWASP Internet of Things Project" [Internet], https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project.
- The MITRE Corporation, "CAPEC CATEGORY: Physical Security" [Internet], https://capec.mitre.org/data/definitions/514.html.
- OWASP, "OWASP Top Ten Cheat Sheet" [Internet], https://www.owasp.org/index.php/OWASP_Top_Ten_Cheat_Sheet.
- SANS, "CWE/SANS TOP 25 Most Dangerous Software Errors" [Internet], http://www.sans.org/top25-software-errors/.
- 3GPP, "Service requirements for Home Node B (HNB) and Home eNode B (HeNB) TS 22.220 v13.0.0," 2016.
- 3GPP, "Security of Home Node B (HNB) / Home evolved Node B (HeNB). Technical Speci cation, TS 33.320 v12.1.0," 2014.
- 3GPP, "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Security of H(e)NB (Release 8), 3GPP TR 33.820 v8.3.0," 2009.
- 3GPP, "Architecture aspects of Home Node B (HNB) / Home enhanced Node B (HeNB) TR 23.830 v9.0.0," 2009.