“…Despite the odds, mobile communication systems have undergone a fair amount of scrutiny from the security research community. For example, internal components of a mobile device [71,74,101], radio communication between the phone and the cell towers [37,162], and mobile core network protocols [55,80,122] have been tested for security-critical issues. All these isolated research e orts are sca ered across underlying protocols and technologies, and, it has resulted in an obscure and complex view of mobile communication security.…”