1 |
K. S. Lee, W. H. Seok, Y. K. Song (ETRI), "The Current Status and Prospect of the Femtocell Market," 2012.
|
2 |
IT donga, "Jammed data traffic fixer, Femtocell," 2012 [Internet], http://it.donga.com/9540/.
|
3 |
Borgaonkar, Ravishankar, Kevin Redon, and Jean-Pierre Seifert, "Security analysis of a femtocell device," Proceedings of the 4th International Conference on Security of Information and Networks, ACM, 2011.
|
4 |
Alexey Osipov and Alexander Zaitsev, "ADVENTURES IN FEMTOLAND: 350 YUAN FOR INVALUABLE FUN," Black Hat Las Vegas (2015).
|
5 |
Shostack, Adam, "Threat modeling: Designing for security," John Wiley & Sons, 2014.
|
6 |
Loren Kohnfelder and Praerit Garg, "The threats to our products," 1999 [Internet], https://blogs.msdn.com/cfs-filesystemfile.ashx/__key/communityserver-components-postattachments/00-09-88-74-86/The-threats-to-our-products.docx.
|
7 |
Microsoft, "The STRIDE Threat Model," 2005 [Internet], https://msdn.microsoft.com/en-us/library/ms954176.aspx.
|
8 |
Carnegie Mellon University Software Engineering Institute, "Octave," 2001 [Internet], http://www.cert.org/resilience/products-services/octave/index.cfm.
|
9 |
Schiffman Mike, et al., "The Common Vulnerability Scoring System," National Infrastructure Advisory Council, Vulnerability Disclosure Working Group, Vulnerability Scoring Subgroup (2004).
|
10 |
Brenda Larcom and Eleanor Saitta, "Trike" [Internet], http://www.octotrike.org/.
|
11 |
STANDARDS NEW ZEALNAD, "AS/NZS ISO 31000:2009," 2009 [Internet], http://shop.standards.co.nz/catalog/31000%3A2009%28AS%7CNZS+ISO%29/view.
|
12 |
Tony UcedaVelez, Marco M. Morana. "Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis," John Wiley, 2015.
|
13 |
Klockwork, "Threat Modeling for Secure Embedded Software," Security Innovation & Klockwork, White Paper, 2011.
|
14 |
DistriNet Research Group, "LINDDUN privacy threat modeling," 2014 [Internet], https://distrinet.cs.kuleuven.be/software/linddun/index.php.
|
15 |
M. Deng, K. Wuyts et al., "A Privacy Threat Analysis Framework: Supporting the Elicitation and Fulfillment of Privacy Requirements," Journal of Requirements Engineering, Springer-Verlag, 2011.
|
16 |
D. Parker, "Our Excessively Simplistic Information Security Model and How to Fix It," ISSA Journal, pp.12-21, July, 2010.
|
17 |
Microsoft, "Evaluating Security Threats" [Internet], https://msdn.microsoft.com/en-us/library/ms172104(v=vs.80).aspx.
|
18 |
Deng, Mina et al. "A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements," Requirements Engineering, Vol.16, No.1 pp.3-32, 2011.
DOI
|
19 |
Klocwork, "Threat Modeling for Secure Embedded Software," 2014 [Internet], http://www.klocwork.com/getattachment/bb113ce3-8930-484c-9762-3cc4ef904975/Threat-Modeling-for-Secure-Embedded-Software?sitename=Klocwork.
|
20 |
CISCO, "Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2014-2019 White Paper," 2015 [Internet], http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white_paper_c11-520862.html.
|
21 |
I. S. Hwang, "Ultra-compact smart solutions led by evolution wireless network 'Femtocell'," NETWORK TIMES, 2011.07.
|
22 |
GSM Association, "Security Issues in HNB Deployment," Technical report, July, 2008.
|
23 |
3GPP, "Security of Home Node B (HNB) / Home evolved Node B (HeNB)," 3GPP TS 33.320 v9.5.0, Mar., 2011.
|
24 |
Borgaonkar, Ravishankar, Kevin Redon, and Jean-pierre Seifert, "Experimental Analysis of the Femtocell Location Verification Techniques," in Proceedings of the 15th Nordic Conference in Secure IT Systems, (NordSec. 2010.).
|
25 |
R. Rajavelsamy, Jicheol Lee, and Sungho Choi, "Towards security architecture for Home (evolved) NodeB: challenges, requirements, and solutions," in Security and Communication Networks, pp.471-481, April, 2011, John Wiley & Sons Ltd.
DOI
|
26 |
Chan-Kyu Han, Hyoung-Kee Choi, and In-Hwan Kim, "Building Femtocell More Secure with Improved Proxy Signature," in Proceedings of Global Telecommunications Conference, GLOBECOM 2009. IEEE, November, 2009.
|
27 |
Borgaonkar, Ravishankar, and Kevin Redon, "Femtocell Security," 2010.
|
28 |
Borgaonkar, Ravishankar, Nico Golde, and Kevin Redon, "Femtocells: a Poisonous Needle in the Operator's Hay Stack," Black Hat Las Vegas, 2011.
|
29 |
Golde Nico, Kevin Redon, and Ravishankar Borgaonkar, "Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications," NDSS, 2012.
|
30 |
Faisal Bin Ubaid and Adil Yasin, "Brief Overview on Femtocell Architecture & its Threats," Journal of Information & Communication Technology, Vol.6, No.2, pp.27-32, Fall, 2012.
|
31 |
Tom Ritter, Doug DePerry, and Andrew Rahimi, "I Can Hear You Now: Traffic Interception & Remote Mobile Phone Cloning," Black Hat Las Vegas, 2013.
|
32 |
Alexey Osipov and Alexander Zaitsev, "ADVENTURES IN FEMTOLAND: 350 YUAN FOR INVALUABLE FUN," Black Hat Las Vegas, 2015.
|
33 |
Yuwei Zheng and Haoqi Shan, "Build a free cellular traffic capture tool with a vxworks based femoto," DEFCON, 2015.
|
34 |
Hansol Inticube, "IPLS" [Internet], https://www.hansolinticube.com/mobile/sub03_ipls.html.
|
35 |
Netmanias, "LTE Network Architecture," 2011 [Internet], http://www.netmanias.com/ko/post/blog/5344/lte-nrm/ltenetwork-architecture-network-reference-model.
|
36 |
Netmanias, "Network Architecture for LTE and Wi-Fi Interworking," 2012 [Internet], http://www.netmanias.com/ko/?m=view&id=techdocs&no=5537.
|
37 |
Information and communications technology glossary, "HO Hand-Off, Handoff, Handover," 2011 [Internet], http://www.ktword.co.kr/abbr_view.php?m_temp1=770.
|
38 |
CRESTEL, "Crestel CGF - Charging Gateway Function -Overview," [Internet], http://www.crestel.in/cgf-charginggateway-function.html.
|
39 |
Information and communications technology glossary, "IMS (IP Multimedia Subsystem)" [Internet], http://www.ktword.co.kr/abbr_view.php?m_temp1=3238.
|
40 |
Daniel Miessler, "IoT Attack Surfaces," DEFCON, 2015.
|
41 |
Common Vulnerabilities and Exposures, "CVE-2013-2270" [Internet], https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2270.
|
42 |
Brassil, Jack, et al., "Authenticating Location with Femtocells," submitted for publication, 2012.
|
43 |
Arapinis, Myrto, et al., "New privacy issues in mobile telephony: fix and verification," Proceedings of the 2012 ACM Conference on Computer and Communications Security, ACM, 2012.
|
44 |
The MITRE Corporation, "CAPEC CATEGORY: Software" [Internet], https://capec.mitre.org/data/definitions/513.html.
|
45 |
The MITRE Corporation, "CAPEC CATEGORY: Hardware" [Internet], https://capec.mitre.org/data/definitions/515.html.
|
46 |
SANS, "CWE/SANS TOP 25 Most Dangerous Software Errors" [Internet], http://www.sans.org/top25-software-errors/.
|
47 |
OWASP, "OWASP Internet of Things Project" [Internet], https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project.
|
48 |
The MITRE Corporation, "CAPEC CATEGORY: Physical Security" [Internet], https://capec.mitre.org/data/definitions/514.html.
|
49 |
OWASP, "OWASP Top Ten Cheat Sheet" [Internet], https://www.owasp.org/index.php/OWASP_Top_Ten_Cheat_Sheet.
|
50 |
3GPP, "Service requirements for Home Node B (HNB) and Home eNode B (HeNB) TS 22.220 v13.0.0," 2016.
|
51 |
3GPP, "Security of Home Node B (HNB) / Home evolved Node B (HeNB). Technical Speci cation, TS 33.320 v12.1.0," 2014.
|
52 |
3GPP, "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Security of H(e)NB (Release 8), 3GPP TR 33.820 v8.3.0," 2009.
|
53 |
3GPP, "Architecture aspects of Home Node B (HNB) / Home enhanced Node B (HeNB) TR 23.830 v9.0.0," 2009.
|