Skip to main content

Showing 1–4 of 4 results for author: Ordean, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2301.02487  [pdf, other

    cs.CR

    Watching your call: Breaking VoLTE Privacy in LTE/5G Networks

    Authors: Zishuai Cheng, Mihai Ordean, Flavio D. Garcia, Baojiang Cui, Dominik Rys

    Abstract: Voice over LTE (VoLTE) and Voice over NR (VoNR) are two similar technologies that have been widely deployed by operators to provide a better calling experience in LTE and 5G networks, respectively. The VoLTE/NR protocols rely on the security features of the underlying LTE/5G network to protect users' privacy such that nobody can monitor calls and learn details about call times, duration, and direc… ▽ More

    Submitted 6 January, 2023; originally announced January 2023.

  2. arXiv:2205.06567  [pdf, other

    cs.CR

    Millimeter-Wave Automotive Radar Spoofing

    Authors: Mihai Ordean, Flavio D. Garcia

    Abstract: Millimeter-wave radar systems are one of the core components of the safety-critical Advanced Driver Assistant System (ADAS) of a modern vehicle. Due to their ability to operate efficiently despite bad weather conditions and poor visibility, they are often the only reliable sensor a car has to detect and evaluate potential dangers in the surrounding environment. In this paper, we propose several at… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

  3. arXiv:2111.12456  [pdf, other

    cs.CR

    SoK: Untangling File-based Encryption on Mobile Devices

    Authors: David Galindo, Jia Liu, Chris McMahon Stone, Mihai Ordean

    Abstract: File-based encryption (FBE) schemes have been developed by software vendors to address security concerns related to data storage. While methods of encrypting data-at-rest may seem relatively straightforward, the main proponents of these technologies in mobile devices have nonetheless created seemingly different FBE solutions. As most of the underlying design decisions are described either at a hig… ▽ More

    Submitted 24 November, 2021; originally announced November 2021.

  4. CAOS: Concurrent-Access Obfuscated Store

    Authors: Mihai Ordean, Mark Ryan, David Galindo

    Abstract: This paper proposes Concurrent-Access Obfuscated Store (CAOS), a construction for remote data storage that provides access-pattern obfuscation in a honest-but-curious adversarial model, while allowing for low bandwidth overhead and client storage. Compared to the state of the art, the main advantage of CAOS is that it supports concurrent access without a proxy, for multiple read-only clients and a… ▽ More

    Submitted 3 June, 2019; v1 submitted 29 September, 2017; originally announced September 2017.

    Journal ref: The 24th ACM Symposium on Access Control Models and Technologies (SACMAT '19), June 3--6, 2019, Toronto, ON, Canada