@inproceedings{f85823fb7a4b4ffcab7baa3d7fd767ad,
title = "Mobile data charging: New attacks and countermeasures",
abstract = "3G/4G cellular networks adopt usage-based charging. Mobile users are billed based on the traffic volume when accessing data service. In this work, we assess both this metered accounting architecture and application-specific charging policies by operators from the security perspective. We have identified loopholes in both, and discovered two effective attacks exploiting the loopholes. The {"}tollfree-data-access-attack{"} enables the attacker to access any data service for free. The {"}stealth-spam-attack{"} incurs any large traffic volume to the victim, while the victim may not be even aware of such spam traffic. Our experiments on two operational 3G networks have confirmed the feasibility and simplicity of such attacks. We also propose defense remedies.",
keywords = "Accounting attacks, Cellular networks, Mobile data services",
author = "Chunyi Peng and Chi-Yu Li and Tu, {Guan Hua} and Songwu Lu and Lixia Zhang",
year = "2012",
month = nov,
day = "26",
doi = "10.1145/2382196.2382220",
language = "English",
isbn = "9781450316507",
series = "Proceedings of the ACM Conference on Computer and Communications Security",
pages = "195--204",
booktitle = "CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security",
note = "2012 ACM Conference on Computer and Communications Security, CCS 2012 ; Conference date: 16-10-2012 Through 18-10-2012",
}