This course teaches learners how to automatically discover LTE vulnerabilities through documentation analysis. The learning outcomes include understanding LTE network architecture, detecting hazard indicators, passing dependencies, creating a test environment, analyzing results, identifying attack windows, and summarizing the thread model. The course is designed for individuals interested in cybersecurity, network security, and LTE technology. The teaching method involves a presentation format covering the introduction, network architecture, approach, results, and summary of the Bookworm Game technique.
Overview
Syllabus
Introduction
Central Network
Network Architecture
Hazard Indicator Detection
Dependency Passing
Test Environment
Approach
Results
Attack Window
Thread Model
Summary
Taught by
IEEE Symposium on Security and Privacy