@@ -39,14 +39,14 @@ documents:
3939 title : " LTE Impersonation Attack Demonstration"
4040 description : " Live demonstration of LTE impersonation attack techniques"
4141 relatedDocuments :
42- - title : " LTE Authentication Protocol Analysis"
43- description : " Detailed analysis of LTE authentication protocols and vulnerabilities "
44- category : " 4G Network Security"
45- url : " lte-authentication -analysis.html"
46- - title : " 4G Network Security Best Practices "
47- description : " Best practices for securing 4G LTE networks "
48- category : " 4G Network Security"
49- url : " 4g -security-best-practices .html"
42+ - title : " 5G Network Security Analysis"
43+ description : " Comprehensive analysis of 5G network security architecture "
44+ category : " 5G Network Security"
45+ url : " 5g-security -analysis.html"
46+ - title : " SS7 Protocol Security"
47+ description : " Comprehensive analysis of SS7 protocol vulnerabilities "
48+ category : " SS7 Protocol Security"
49+ url : " ss7 -security.html"
5050 externalReferences :
5151 - name : " 3GPP Security Specifications"
5252 url : " https://www.3gpp.org/specifications-groups/sa-plenary/sa3-security"
@@ -97,10 +97,10 @@ documents:
9797 description : " Security considerations for 5G network slicing"
9898 category : " 5G Network Security"
9999 url : " 5g-network-slicing.html"
100- - title : " 5G IoT Security Framework "
101- description : " Security framework for 5G IoT deployments "
102- category : " 5G Network Security"
103- url : " 5g-iot -security.html"
100+ - title : " SIM Card Security Analysis "
101+ description : " Comprehensive analysis of SIM card vulnerabilities "
102+ category : " SIM Cards & UICC Security"
103+ url : " sim-card -security.html"
104104 externalReferences :
105105 - name : " 3GPP 5G Security"
106106 url : " https://www.3gpp.org/specifications-groups/sa-plenary/sa3-security"
@@ -146,10 +146,10 @@ documents:
146146 description : " Comprehensive 5G security analysis"
147147 category : " 5G Network Security"
148148 url : " 5g-security-analysis.html"
149- - title : " 5G Slice Isolation Techniques "
150- description : " Advanced isolation techniques for 5G network slices "
151- category : " 5G Network Security"
152- url : " 5g-slice-isolation .html"
149+ - title : " Baseband Security Analysis "
150+ description : " Analysis of baseband processor vulnerabilities "
151+ category : " Baseband Security"
152+ url : " baseband-security .html"
153153 externalReferences :
154154 - name : " 3GPP 5G Security"
155155 url : " https://www.3gpp.org/specifications-groups/sa-plenary/sa3-security"
@@ -196,14 +196,14 @@ documents:
196196 title : " SS7 Security Overview"
197197 description : " Overview of SS7 security vulnerabilities and protection methods"
198198 relatedDocuments :
199- - title : " SS7 Mitigation Strategies "
200- description : " Advanced strategies for mitigating SS7 vulnerabilities "
201- category : " SS7 Protocol Security"
202- url : " ss7-mitigation .html"
203- - title : " Signaling Security Best Practices "
204- description : " Best practices for securing signaling protocols "
205- category : " SS7 Protocol Security"
206- url : " signaling -security.html"
199+ - title : " 4G LTE Impersonation Attack Analysis "
200+ description : " Comprehensive analysis of 4G LTE impersonation attacks "
201+ category : " 4G Network Security"
202+ url : " 4g-impersonation-attack .html"
203+ - title : " 5G Network Security Analysis "
204+ description : " Comprehensive analysis of 5G network security "
205+ category : " 5G Network Security"
206+ url : " 5g -security-analysis .html"
207207 externalReferences :
208208 - name : " SS7 Security Vulnerabilities"
209209 url : " https://www.blackhat.com/us-17/briefings.html#ss7"
@@ -250,14 +250,14 @@ documents:
250250 title : " UICC Security Overview"
251251 description : " Overview of UICC security features and protection mechanisms"
252252 relatedDocuments :
253- - title : " UICC Security Standards "
254- description : " Security standards for UICC implementation "
255- category : " SIM Cards & UICC Security"
256- url : " uicc -security-standards .html"
257- - title : " SIM Card Attack Prevention "
258- description : " Prevention strategies for SIM card attacks "
259- category : " SIM Cards & UICC Security"
260- url : " sim-attack-prevention .html"
253+ - title : " SS7 Protocol Security "
254+ description : " Comprehensive analysis of SS7 protocol vulnerabilities "
255+ category : " SS7 Protocol Security"
256+ url : " ss7 -security.html"
257+ - title : " Baseband Security Analysis "
258+ description : " Analysis of baseband processor vulnerabilities "
259+ category : " Baseband Security"
260+ url : " baseband-security .html"
261261 externalReferences :
262262 - name : " GSMA SIM Security"
263263 url : " https://www.gsma.com/security/sim-security/"
@@ -304,14 +304,14 @@ documents:
304304 title : " Mobile Device Security"
305305 description : " Comprehensive overview of mobile device security considerations"
306306 relatedDocuments :
307- - title : " Mobile Device Security"
308- description : " Comprehensive mobile device security analysis "
309- category : " Baseband Security"
310- url : " mobile-device -security.html"
311- - title : " Firmware Security Best Practices "
312- description : " Best practices for securing device firmware "
313- category : " Baseband Security "
314- url : " firmware -security.html"
307+ - title : " SIM Card Security Analysis "
308+ description : " Comprehensive analysis of SIM card vulnerabilities "
309+ category : " SIM Cards & UICC Security"
310+ url : " sim-card -security.html"
311+ - title : " Base Station Security "
312+ description : " Security analysis of base stations and physical attacks "
313+ category : " Base Stations "
314+ url : " base-station -security.html"
315315 externalReferences :
316316 - name : " USENIX Security Papers"
317317 url : " https://www.usenix.org/conferences/security"
@@ -358,14 +358,14 @@ documents:
358358 title : " Physical Security for Base Stations"
359359 description : " Physical security measures for protecting base station infrastructure"
360360 relatedDocuments :
361- - title : " Cellular Infrastructure Security"
362- description : " Security considerations for cellular infrastructure "
363- category : " Base Stations "
364- url : " cellular-infrastructure -security.html"
365- - title : " Base Station Access Control "
366- description : " Access control systems for base station security"
367- category : " Base Stations "
368- url : " base-station-access-control .html"
361+ - title : " Baseband Security Analysis "
362+ description : " Analysis of baseband processor vulnerabilities "
363+ category : " Baseband Security "
364+ url : " baseband -security.html"
365+ - title : " FBI Telecom Security Resources "
366+ description : " FBI resources and guidelines for telecom security"
367+ category : " FBI Resources "
368+ url : " fbi-telecom-security .html"
369369 externalReferences :
370370 - name : " 3GPP Base Station Standards"
371371 url : " https://www.3gpp.org/specifications-groups/ran-plenary/tsg-ran"
@@ -412,14 +412,14 @@ documents:
412412 title : " Telecom Security Incident Response"
413413 description : " Best practices for responding to telecom security incidents"
414414 relatedDocuments :
415- - title : " Cybercrime Reporting Guidelines "
416- description : " Guidelines for reporting cybercrime incidents "
417- category : " FBI Resources "
418- url : " cybercrime-reporting .html"
419- - title : " Digital Forensics Procedures "
420- description : " Digital forensics procedures for telecom investigations "
421- category : " FBI Resources "
422- url : " digital-forensics .html"
415+ - title : " Base Station Security "
416+ description : " Security analysis of base stations and physical attacks "
417+ category : " Base Stations "
418+ url : " base-station-security .html"
419+ - title : " Telecom Fraud Analysis "
420+ description : " Analysis of telecom fraud patterns and prevention "
421+ category : " Fraud Detection & Prevention "
422+ url : " telecom-fraud-analysis .html"
423423 externalReferences :
424424 - name : " FBI Cyber Division"
425425 url : " https://www.fbi.gov/investigate/cyber"
@@ -466,14 +466,14 @@ documents:
466466 title : " Machine Learning in Fraud Detection"
467467 description : " Application of machine learning for telecom fraud detection"
468468 relatedDocuments :
469- - title : " Fraud Detection Systems "
470- description : " Implementation of fraud detection systems "
471- category : " Fraud Detection & Prevention "
472- url : " fraud-detection-systems .html"
473- - title : " Revenue Protection Strategies "
474- description : " Strategies for protecting telecom revenue from fraud "
475- category : " Fraud Detection & Prevention "
476- url : " revenue-protection .html"
469+ - title : " FBI Telecom Security Resources "
470+ description : " FBI resources and guidelines for telecom security "
471+ category : " FBI Resources "
472+ url : " fbi-telecom-security .html"
473+ - title : " GPON Security Analysis "
474+ description : " Security analysis of GPON networks and attack vectors "
475+ category : " GPON Security "
476+ url : " gpon-security .html"
477477 externalReferences :
478478 - name : " ACM Digital Library"
479479 url : " https://dl.acm.org/topic/ccs2012/10003120.10003121.10003123"
@@ -520,14 +520,14 @@ documents:
520520 title : " Fiber Network Security"
521521 description : " Security considerations for fiber optic networks"
522522 relatedDocuments :
523- - title : " Fiber Network Security "
524- description : " Security considerations for fiber networks "
525- category : " GPON Security "
526- url : " fiber-network-security .html"
527- - title : " Optical Network Protection "
528- description : " Protection strategies for optical networks "
529- category : " GPON Security"
530- url : " optical-network-protection .html"
523+ - title : " Telecom Fraud Analysis "
524+ description : " Analysis of telecom fraud patterns and prevention "
525+ category : " Fraud Detection & Prevention "
526+ url : " telecom-fraud-analysis .html"
527+ - title : " Roaming Security Analysis "
528+ description : " Security analysis of international roaming services "
529+ category : " Roaming Security"
530+ url : " roaming-security .html"
531531 externalReferences :
532532 - name : " ITU-T GPON Standards"
533533 url : " https://www.itu.int/rec/T-REC-G.984"
@@ -574,14 +574,14 @@ documents:
574574 title : " Mobile Threat Intelligence"
575575 description : " Implementation of mobile threat intelligence systems"
576576 relatedDocuments :
577- - title : " Mobile Threat Intelligence "
578- description : " Implementation of mobile threat intelligence "
579- category : " MoTIF Framework "
580- url : " mobile-threat-intelligence .html"
581- - title : " Threat Intelligence Sharing "
582- description : " Best practices for sharing threat intelligence "
583- category : " MoTIF Framework "
584- url : " threat-intelligence-sharing .html"
577+ - title : " GPON Security Analysis "
578+ description : " Security analysis of GPON networks and attack vectors "
579+ category : " GPON Security "
580+ url : " gpon-security .html"
581+ - title : " APN Security Analysis "
582+ description : " Security analysis of APN configurations and vulnerabilities "
583+ category : " Access Point Names (APNs) "
584+ url : " apn-security .html"
585585 externalReferences :
586586 - name : " GSMA MoTIF"
587587 url : " https://www.gsma.com/security/motif-framework/"
@@ -628,14 +628,14 @@ documents:
628628 title : " Cross-Border Security"
629629 description : " Security challenges in cross-border telecommunications"
630630 relatedDocuments :
631- - title : " Roaming Security Guidelines "
632- description : " Security guidelines for roaming services "
633- category : " Roaming Security "
634- url : " roaming -security-guidelines .html"
635- - title : " Cross-Border Security Framework "
636- description : " Security framework for cross-border services "
637- category : " Roaming Security "
638- url : " cross-border -security.html"
631+ - title : " MoTIF Framework Overview "
632+ description : " Overview of the GSMA MoTIF framework for mobile threat intelligence "
633+ category : " MoTIF Framework "
634+ url : " motif -security.html"
635+ - title : " AT Commands Security Analysis "
636+ description : " Security analysis of AT commands and fuzzing techniques "
637+ category : " AT Commands "
638+ url : " at-commands -security.html"
639639 externalReferences :
640640 - name : " GSMA Roaming Security"
641641 url : " https://www.gsma.com/roaming/security/"
@@ -682,14 +682,14 @@ documents:
682682 title : " APN Configuration Security"
683683 description : " Security considerations for APN configuration management"
684684 relatedDocuments :
685- - title : " APN Configuration Security"
686- description : " Security considerations for APN configuration "
687- category : " Access Point Names (APNs) "
688- url : " apn-configuration -security.html"
689- - title : " Data Service Security"
690- description : " Security for mobile data services "
691- category : " Access Point Names (APNs) "
692- url : " data-service -security.html"
685+ - title : " Roaming Security Analysis "
686+ description : " Security analysis of international roaming services "
687+ category : " Roaming Security "
688+ url : " roaming -security.html"
689+ - title : " Baseband Security Analysis "
690+ description : " Analysis of baseband processor vulnerabilities "
691+ category : " Baseband Security "
692+ url : " baseband -security.html"
693693 externalReferences :
694694 - name : " 3GPP APN Standards"
695695 url : " https://www.3gpp.org/specifications-groups/sa-plenary/sa2-architecture"
@@ -736,14 +736,14 @@ documents:
736736 title : " Mobile Device Security Testing"
737737 description : " Comprehensive security testing for mobile devices"
738738 relatedDocuments :
739- - title : " AT Command Security Guidelines "
740- description : " Security guidelines for AT command implementation "
741- category : " AT Commands "
742- url : " at-commands- security-guidelines .html"
743- - title : " Mobile Device Fuzzing "
744- description : " Fuzzing methodologies for mobile device security "
745- category : " AT Commands "
746- url : " mobile-device-fuzzing .html"
739+ - title : " APN Security Analysis "
740+ description : " Security analysis of APN configurations and vulnerabilities "
741+ category : " Access Point Names (APNs) "
742+ url : " apn- security.html"
743+ - title : " SIM Card Security Analysis "
744+ description : " Comprehensive analysis of SIM card vulnerabilities "
745+ category : " SIM Cards & UICC Security "
746+ url : " sim-card-security .html"
747747 externalReferences :
748748 - name : " 3GPP AT Command Standards"
749749 url : " https://www.3gpp.org/specifications-groups/ran-plenary/tsg-ran"
0 commit comments