Full metadata record
DC Field | Value | Language |
---|---|---|
dc.citation.endPage | 93 | - |
dc.citation.number | 10 | - |
dc.citation.startPage | 85 | - |
dc.citation.title | COMMUNICATIONS OF THE ACM | - |
dc.citation.volume | 64 | - |
dc.contributor.author | Lee, Jihoon | - |
dc.contributor.author | Lee, Gyuhong | - |
dc.contributor.author | Lee, Jinsung | - |
dc.contributor.author | Im, Youngbin | - |
dc.contributor.author | Hollingsworth, Max | - |
dc.contributor.author | Wustrow, Eric | - |
dc.contributor.author | Grunwald, Dirk | - |
dc.contributor.author | Ha, Sangtae | - |
dc.date.accessioned | 2023-12-21T15:11:27Z | - |
dc.date.available | 2023-12-21T15:11:27Z | - |
dc.date.created | 2021-10-18 | - |
dc.date.issued | 2021-10 | - |
dc.description.abstract | Modern cell phones are required to receive and display alerts via the Wireless Emergency Alert (WEA) program, under the mandate of the Warning, Alert, and Response Act of 2006. These alerts include AMBER alerts, severe weather alerts, and (unblockable) Presidential Alerts, intended to inform the public of imminent threats. Recently, a test Presidential Alert was sent to all capable phones in the U.S., prompting concerns about how the underlying WEA protocol could be misused or attacked. In this paper, we investigate the details of this system and develop and demonstrate the first practical spoofing attack on Presidential Alerts, using commercially available hardware and modified open source software. Our attack can be performed using a commercially available software-defined radio, and our modifications to the open source software libraries. We find that with only four malicious portable base stations of a single Watt of transmit power each, almost all of a 50,000-seat stadium can be attacked with a 90% success rate. The real impact of such an attack would, of course, depend on the density of cellphones in range; fake alerts in crowded cities or stadiums could potentially result in cascades of panic. Fixing this problem will require a large collaborative effort between carriers, government stakeholders, and cellphone manufacturers. To seed this effort, we also propose three mitigation solutions to address this threat. | - |
dc.identifier.bibliographicCitation | COMMUNICATIONS OF THE ACM, v.64, no.10, pp.85 - 93 | - |
dc.identifier.doi | 10.1145/3481042 | - |
dc.identifier.issn | 0001-0782 | - |
dc.identifier.scopusid | 2-s2.0-85116021761 | - |
dc.identifier.uri | https://scholarworks.unist.ac.kr/handle/201301/54757 | - |
dc.identifier.url | https://dl.acm.org/doi/10.1145/3481042 | - |
dc.identifier.wosid | 000699961600021 | - |
dc.language | 영어 | - |
dc.publisher | ASSOC COMPUTING MACHINERY | - |
dc.title | Securing the Wireless Emergency Alerts System | - |
dc.type | Article | - |
dc.description.isOpenAccess | TRUE | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture; Computer Science, Software Engineering; Computer Science, Theory & Methods | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.type.docType | Article | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Tel : 052-217-1404 / Email : scholarworks@unist.ac.kr
Copyright (c) 2023 by UNIST LIBRARY. All rights reserved.
ScholarWorks@UNIST was established as an OAK Project for the National Library of Korea.