Vulnerabilities of GSM and Wiretapping

The article presents the main methods used by hackers to listen to telephone conversations of subscribers and also offers ways to protect against them. The authors justify the necessity of developing a trusted operating system that implements a given security measures.

Bibliographic Details
Main Authors: A. V. Novitskiy, D. M. Mikhailov, A. V. Starikovskiy, A. V. Zuykov
Format: Article
Language:English
Published: Moscow Engineering Physics Institute 2012-09-01
Series:Bezopasnostʹ Informacionnyh Tehnologij
Subjects:
GSM
SS7
Online Access:https://bit.mephi.ru/index.php/bit/article/view/443