Zum Hauptinhalt springen

Showing 1–5 of 5 results for author: Dabrowski, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.19556  [pdf, other

    cs.CR cs.NI

    Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi Deployments

    Authors: Gabriel Karl Gegenhuber, Florian Holzbauer, Philipp Frenzel, Edgar Weippl, Adrian Dabrowski

    Abstract: Voice over Wi-Fi (VoWiFi) uses a series of IPsec tunnels to deliver IP-based telephony from the subscriber's phone (User Equipment, UE) into the Mobile Network Operator's (MNO) core network via an Internet-facing endpoint, the Evolved Packet Data Gateway (ePDG). IPsec tunnels are set up in phases. The first phase negotiates the cryptographic algorithm and parameters and performs a key exchange via… ▽ More

    Submitted 6 August, 2024; v1 submitted 28 July, 2024; originally announced July 2024.

    Journal ref: USENIX Security 2024

  2. arXiv:2403.08507  [pdf, other

    cs.NI cs.CR

    MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research

    Authors: Gabriel Karl Gegenhuber, Wilfried Mayer, Edgar Weippl, Adrian Dabrowski

    Abstract: Cellular networks are not merely data access networks to the Internet. Their distinct services and ability to form large complex compounds for roaming purposes make them an attractive research target in their own right. Their promise of providing a consistent service with comparable privacy and security across roaming partners falls apart at close inspection. Thus, there is a need for controlled… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

    Journal ref: USENIX Security 2023

  3. arXiv:2112.08604  [pdf

    cs.CV cs.IR

    Use Image Clustering to Facilitate Technology Assisted Review

    Authors: Haozhen Zhao, Fusheng Wei, Hilary Quatinetz, Han Qin, Adam Dabrowski

    Abstract: During the past decade breakthroughs in GPU hardware and deep neural networks technologies have revolutionized the field of computer vision, making image analytical potentials accessible to a range of real-world applications. Technology Assisted Review (TAR) in electronic discovery though traditionally has dominantly dealt with textual content, is witnessing a rising need to incorporate multimedia… ▽ More

    Submitted 15 December, 2021; originally announced December 2021.

    Comments: 2021 IEEE International Conference on Big Data (Big Data)

  4. arXiv:1912.00345  [pdf, ps, other

    math.NT cs.CC

    On oracle factoring of integers

    Authors: Andrzej Dąbrowski, Jacek Pomykała, Igor E. Shparlinski

    Abstract: We present an oracle factorisation algorithm which finds a nontrivial factor of almost all positive integers $n$ based on the knowledge of the number of points on certain elliptic curves in residue rings modulo $n$.

    Submitted 25 January, 2023; v1 submitted 1 December, 2019; originally announced December 2019.

  5. arXiv:1710.08932  [pdf, other

    cs.CR

    On Security Research Towards Future Mobile Network Generations

    Authors: David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper

    Abstract: Over the last decades, numerous security and privacy issues in all three active mobile network generations have been revealed that threaten users as well as network providers. In view of the newest generation (5G) currently under development, we now have the unique opportunity to identify research directions for the next generation based on existing security and privacy issues as well as already p… ▽ More

    Submitted 6 March, 2018; v1 submitted 24 October, 2017; originally announced October 2017.

    Comments: Survey: 198 citations, 25 pages, 4 tables, 3 figures