Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS and Android

by Jethro G. Beekman , Christopher Thompson