• End-to-End Data Protection of SMS Messages 

      Øztarman, Jo Mehmet Sollihagen (Master thesis, 2011)
      Short Message Service (SMS) has become a very commonly used service. It does not only work as a substitute for voice telephony, but is also used for automated services. Some of these service are related to security issues ...
    • Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging 

      Sørseth, Christian; Zhou, Xianyu Shelley; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2018)
      Over the last years, considerable attention has been given to the privacy of individuals in wireless environments. Although significantly improved over the previous generations of mobile networks, LTE still exposes ...
    • Experimental Analysis of Subscribers’ Privacy Exposure by LTE Paging 

      Sørseth, Christian; Zhou, Shelley; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2019)
      Over the last years, considerable attention has been given to the privacy of individuals in wireless environments. Although significantly improved over the previous generations of mobile networks, LTE still exposes ...
    • Experimental Assessment of Private Information Disclosure in LTE Mobile Networks 

      Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Chapter, 2017)
      Open source software running on SDR (Software Defined Radio) devices now allow building a full-fledged mobile network at low cost. These novel tools open up for exciting possibilities to analyse and verify by experiments ...
    • Forensic analysis of an unknown embedded device 

      Eide, Jarle; Olsen, Jan Ove Skogheim (Master thesis, 2006)
      Every year thousands of new digital consumer device models come on the market. These devices include video cameras, photo cameras, computers, mobile phones and a multitude of different combinations. Most of these devices ...
    • Forensic analysis of an unknown embedded device 

      Eide, Jarle; Olsen, Jan Ove Skogheim (Master thesis, 2006)
      Every year thousands of new digital consumer device models come on the market. These devices include video cameras, photo cameras, computers, mobile phones and a multitude of different combinations. Most of these devices ...
    • From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS 

      Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas (Chapter, 2016)
      Authentication and authenticated encryption with associated data (AEAD) are applied in cryptographic protocols to provide message integrity. The definitions in the literature and the constructions used in practice all ...
    • GSM and GPRS Security Using OsmocomBB 

      Pönsgen, Francois Louis (Master thesis, 2015)
      This thesis analyzes the security of Norwegian GSM and GPRS networks using the OsmocomBB project, which aims to create a free and open source GSM baseband software implementation. OsmocomBB was used to understand the GSM ...
    • Handle Firewall Security Policy by Graphical Traffic Matrix: Grouping of Firewall Rules 

      Kaspersen, Arne Yngve (Master thesis, 2007)
      Organizations today are in trust of the diversity the Internet gives. With a connection they re able to do end-to-end communication with customers and partners everywhere in the world, and because the diversity of Internet, ...
    • Høringssvar ang. forslag til endringer i valgforskriften 

      Mjølsnes, Stig Frode; Amundsen, Vilde Elise (Research report, 2018)
      Dette høringssvaret har sitt utgangspunkt i et masteroppgavearbeid av Vilde Amundsen under utførelse dette høstsemesteret ved Institutt for informasjonssikkerhet og kommunikasjonsteknologi ved NTNU, i samarbeid med ekstern ...
    • Identification, Location Tracking and Eavesdropping on Individuals by Wireless Local Area Communications 

      Andersen, Markus (Master thesis, 2019)
      Nesten alt brukerutstyr med trådløs funksjonalitet har maskinvare som har en MAC-adresse innebygd. En MAC-adresse er en unik ID, i lag to av OSI-modellen [1], for å separere brukerutstyr i lokale nettverk (LAN). En MAC-adresse ...
    • Implementing a Secure Ad Hoc Network 

      Graarud, Espen Grannes (Master thesis, 2011)
      In emergency situations such as natural disasters the emergency personell shouldbe able to establish communication fast and reliably. Depending on the nature ofthe disaster one cannot rely on existing communication ...
    • Integration and verification of a keyed-hash message authentication scheme based on broadcast timestamps for NUTS 

      Muench, Marius (Master thesis, 2014)
      The NTNU Test Satellite (NUTS) is a small satellite developed by students of the Norwegian University of Science and Technology (NTNU). The satellite follows the CubeSat specification and the development started in 2010, ...
    • Introducing Mobile Network Security Experiments to Communication Technology Education 

      Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2017)
      We describe a new viable lab assignment that enhances the theoretical study of wireless network security in our master-level communication technology education with hands-on mobile access network experimentation for the ...
    • Investigation of LTE Privacy Attacks by Exploiting the Paging Mechanism 

      Zhou, Shelley Xianyu (Master thesis, 2018)
      In mobile communication in general, and LTE in particular, security should be a main focus, also because of the vulnerabilities introduced by the radio link. Compared to GSM and UMTS, the LTE security has been improved. ...
    • Is the Session Mix-up Attack on the UMTS/LTE AKA Protocol Practical? 

      Bhusal, Ashim (Master thesis, 2013)
      Tsay and Mjølsnes [1, 2, 3] have detected a protocol-level security vulnerability in the specifications of the Authentication and Key Agreement (AKA) protocols of the GSM/UMTS/LTE family of mobile network systems. It is ...
    • Key Management for Data Plane Encryption in SDN Using WireGuard 

      Braadland, Anna Selvåg (Master thesis, 2017)
      Software Defined Networks (SDNs) decouple the control plane and the data plane, congregating control functions in a designated entity in the network, the controller. The decoupling realizes a highly dynamic network which ...
    • Kryptoanalyse og anngrep på Bluetooth 

      Haugen, Marius Amund (Master thesis, 2012)
      Bluetooth en teknologi som brukes til ad-hoc nettverk over kort avstand. Teknologien brukes av milliarder av enheter på verdensbasis for å koble sammen neste hva det skal være av enheter. Ubertooth er en Bluetooth ...
    • Location Disclosure in LTE Networks by using IMSI Catcher 

      Sørseth, Christian (Master thesis, 2017)
      Long-Term Evolution (LTE) is currently being deployed in vast areas of the world and is the latest implemented standard in mobile communication. The standard is considered to have significant improvements compared to its ...
    • Long-Term Confidential Data Storage by Distributed Secret Shares 

      Løland Elle, Merete (Master thesis, 2017)
      There are several mobile password managers on the marked, where the most popular of these uses the classical solution for storage which requires both encryption and backup policies. If quantum computers become a reality, ...