2017
DOI: 10.1515/popets-2017-0027
|View full text |Cite
|
Sign up to set email alerts
|

SeaGlass: Enabling City-Wide IMSI-Catcher Detection

Abstract: Cell-site simulators, also known as IMSI-catchers and stingrays, are used around the world by governments and criminals to track and eavesdrop on cell phones. Despite extensive public debate surrounding their use, few hard facts about them are available. For example, the richest sources of information on U.S. government cell-site simulator usage are from anonymous leaks, public records requests, and court proceedings. This lack of concrete information and the difficulty of independently obtaining such informat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(29 citation statements)
references
References 4 publications
0
28
0
Order By: Relevance
“…At the same time, we used the land cover data and OSM map data to extract the geographic elements of impervious surfaces, water bodies, and green spaces in Wuhan, then calculated the ratio grid of each element. Depending on the size of our study area, the grid accuracy can range from 10 to 1,000 m. Referring to the previous urban grid‐based analysis (DiCenzo & Wertheim, ; Kalashnikov, Prabhakar, Hambrusch, & Aref, ; Liu et al, ; Ney, Smith, Cadamuro, & Kohno, ; Yan, Li, & Lin, ), we select a moderate gird size of 100 × 100 m for data collection.…”
Section: Materials and Methodologymentioning
confidence: 99%
“…At the same time, we used the land cover data and OSM map data to extract the geographic elements of impervious surfaces, water bodies, and green spaces in Wuhan, then calculated the ratio grid of each element. Depending on the size of our study area, the grid accuracy can range from 10 to 1,000 m. Referring to the previous urban grid‐based analysis (DiCenzo & Wertheim, ; Kalashnikov, Prabhakar, Hambrusch, & Aref, ; Liu et al, ; Ney, Smith, Cadamuro, & Kohno, ; Yan, Li, & Lin, ), we select a moderate gird size of 100 × 100 m for data collection.…”
Section: Materials and Methodologymentioning
confidence: 99%
“…2) Defenses: Similar to unsecured pre-authentication traffic, fake base stations that exploit the non-existing mutual authentication can be detected with mobile apps, baseband firewalls, sensors, or network-based sensors [64], [65], [66], [67], [68], [69], [110]. Nevertheless, mobile apps do not sufficiently protect against the threat of fake base stations [111].…”
Section: B Cause: Non-existing Mutual Authenticationmentioning
confidence: 99%
“…Energy Network Processing Storage Time Sync Location Caraoke [1] Bouillet et al [10] AirCloud [14] Girod et al [22] Lédeczi et al [27] SenseFlow [31] Argos [50] SONYC [41] Kyun Queue [51] Micronet [24] Seaglass [43] Table 1: Services required by existing applications. Time is millisecond-accurate as provided by services like NTP, while Sync is microsecond-accurate as provided by GPS.…”
Section: Deploymentmentioning
confidence: 99%
“…Many have paired mobile phones with handheld air quality monitors [7,14,17,18], or used phones to directly meter noise pollution [9,35,47] or traffic conditions [38,54,61]. Similar to participatory sensing methods, vehicular sensor networks monitor air quality, traffic, and road conditions [17,19,23,29,36], and even detect rogue cellular base stations [43]. These types of deployments often scale very well as the mobility of the devices allows a few sensors to reach a much larger area.…”
Section: Deploymentmentioning
confidence: 99%