-
iCKB is now approaching its final stage before launch: iCKB is undergoing an internal audit, later a formal external audit, then shortly after iCKB will finally launch on mainnet.
Given all this, I…
-
**Github username:** --
**Twitter username:** --
**Submission hash (on-chain):** 0xec7bc17cdbb6208d02f4a0ac0ea20b9ec3edd1f02deacab6e2ed24110ac2450f
**Severity:** high
**Description:**
## Impact
Atta…
-
# Random Access Channel Request Replay Attack
## Implementation (UE):
- Capture the RACH requests of other UEs
- Replay these requests later to confuse the RAN
## Mitigation (UE and gNB):
- a…
-
# Random Access User Equipment Preamble Collision
## Implementation (UE):
- Capture the preamble message of another UE
- Send the capture preamble repeatedly to confuse the network
- repeat the …
-
# International Mobile Subscriber Identity Catching Attack
## Implementation (gNB):
Create a dummy gNB:
- configure the gNB to have a higher signal strength than the other
- configure the dumm…
-
### Prerequisites
- [ ] I have carried out troubleshooting steps and I believe I have found a bug.
- [X] I have searched for similar bugs in both open and closed issues and cannot find a duplicate.
…
-
Hi! Thanks for sharing your work.
I would like to know are adversarial attacks also included in the benchmark? If yes, which type of attacks have been included?
-
The Eye can appear that it has suffered an attack after warning Vlad about The Hunter, despite an attack never occurring if you do this.
---
## Details
In NG+, if you warn Vlad about the Hunte…
-
The framework needs an effective way of quantifying how much privacy is leaked as a function of topology/collaboration approach between nodes. Additionally, this requires integrating existing well-kno…
-
**Github username:** --
**Twitter username:** --
**Submission hash (on-chain):** 0xec7bc17cdbb6208d02f4a0ac0ea20b9ec3edd1f02deacab6e2ed24110ac2450f
**Severity:** high
**Description:**
## Impact
Loss…