Attack analysis and Security concepts for MObile Network infrastructures,
supported by collaborative Information exchAnge

Publications of the ASMONIA project

This page provides information about publications and conference contributions prepared within the ASMONIA project.


  • Mirko Haustein, Herbert Sighart, Dennis Titze and Peter Schoo, "Collaboratively Exchanging Warning Messages Between Peers While Under Attack", Proceed. of 1st Int. Workshop on Emerging Cyberthreats and Countermeasures (ECTCM 2013) during ARES 2013, 4 September 2013, Regensburg, Germany.
  • Dennis Titze, Hans Hofinger and Peter Schoo, "Using Secure Multiparty Computation for Collaborative Information Exchange", Proceed. of 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13), 16-18 July, 2013, Melbourne, Australia.
  • Sascha Wessel, Frederic Stumpf, Ilja Herdt and Claudia Eckert, "Improving Mobile Device Security with Operating System-level Virtualization", 28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference, Auckland, New Zealand, July, 2013


  • Manfred Schäfer, "Risk Analysis and Software Integrity Protection for 4G Network Elements in ASMONIA"
    in: Frank Ortmeier, Peter Daniel (Eds.): Computer Safety, Reliability, and Security - 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedings, pp. 49-61, Lecture Notes in Computer Science 7612 Springer 2012, ISBN 978-3-642-33677-5.
  • Steffen Wagner, Sascha Wessel, and Frederic Stumpf, "Attestation of Mobile Baseband Stacks",
    6th International Conference on Network and System Security (NSS 2012), November, 2012.
  • Peter Schoo, Manfred Schäfer, André Egners, Hans Hofinger, Sascha Wessel, Marian Kühnel, Sascha Todt, and Michael Montag, "Collaboration Between Competing Mobile Network Operators to Improve CIIP",
    7th Conference on Critical Information Infrastructures Security (CRITIS 2012), September, 2012.
  • André Egners, Björn Marschollek, Ulrike Meyer, "Messing with Android's Permission Model",
    IEEE International Conference on Trust, Security and Privacy in Computing and Communications, June, 2012.
  • André Egners, Björn Marschollek, Ulrike Meyer, "Hackers in Your Pocket: A Survey of Smartphone Security Across Platforms",
    RWTH Aachen University, Technical Report, AIB-2012-07, May, 2012.
  • Sascha Wessel, Frederic Stumpf, "Page-based Runtime Integrity Protection of User and Kernel Code",
    5th European Workshop on System Security, April, 2012.
  • ASMONIA tools for penetration testing of mobile telecomunication networks (hosted at
    • dizzy Download (tar.gz, 12.0 KB)
    • apnbf Download (tar.gz, 4.3 KB)
    • gtp_scan Download (tar.gz, 2.8 KB)


  • Manfred Schäfer, Wolf-Dietrich Moeller, "Tailored Concepts for Software Integrity Protection in Mobile Networks",
    International Journal On Advances in Security Vol.4, September 2011, Download (PDF, 626.8 KB).
  • Michael Hoche, Heiko Kirsch, "Mit Sicherheit zum Geschäftserfolg: Ökonomische Einflüsse von Sicherheitsmechanismen auf die Wertschöpfung in Mobilfunknetzen",
    Praxis der Informationsverarbeitung und Kommunikation (PIK) Journal, 2011.

Valid XHTML 1.0 | Valid CSS 2.1