%0 Conference Proceedings %T A Review of Security Attacks on the GSM Standard %+ Università degli Studi di Salerno = University of Salerno (UNISA) %+ Università degli Studi di Roma "La Sapienza" = Sapienza University [Rome] (UNIROMA) %A Cattaneo, Giuseppe %A Maio, Giancarlo, De %A Faruolo, Pompeo %A Petrillo, Umberto, Ferraro %Z Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES) %< avec comité de lecture %( Lecture Notes in Computer Science %B 1st International Conference on Information and Communication Technology (ICT-EurAsia) %C Yogyakarta, Indonesia %Y David Hutchison %Y Takeo Kanade %Y Madhu Sudan %Y Demetri Terzopoulos %Y Doug Tygar %Y Moshe Y. Vardi %Y Gerhard Weikum %Y Khabib Mustofa %Y Erich J. Neuhold %Y A Min Tjoa %Y Edgar Weippl %Y Ilsun You %Y Josef Kittler %Y Jon M. Kleinberg %Y Friedemann Mattern %Y John C. Mitchell %Y Moni Naor %Y Oscar Nierstrasz %Y C. Pandu Rangan %Y Bernhard Steffen %I Springer %3 Information and Communicatiaon Technology %V LNCS-7804 %P 507-512 %8 2013-03-25 %D 2013 %R 10.1007/978-3-642-36818-9_58 %K GSM %K mobile security %K security attacks %K encryption %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X The Global Systems for Mobile communications (GSM) is the most widespread mobile communication technology existing nowadays. Despite being a mature technology, its introduction dates back to the late eighties, it suffers from several security vulnerabilities, which have been targeted by many attacks aimed to break the underlying communication protocol. Most of these attacks focuses on the A5/1 algorithm used to protect over-the-air communication between the two parties of a phone call. This algorithm has been superseded by new and more secure algorithms. However, it is still in use in the GSM networks as a fallback option, thus still putting at risk the security of the GSM based conversations. The objective of this work is to review some of the most relevant results in this field and discuss their practical feasibility. To this end, we consider not only the contributions coming from the canonical scientific literature but also those that have been proposed in a more informal context, such as during hacker conferences. %G English %Z TC 5 %Z TC 8 %2 https://inria.hal.science/hal-01480210/document %2 https://inria.hal.science/hal-01480210/file/978-3-642-36818-9_58_Chapter.pdf %L hal-01480210 %U https://inria.hal.science/hal-01480210 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC5 %~ IFIP-TC8 %~ IFIP-ICT-EURASIA %~ IFIP-LNCS-7804