Abstract
This research paper examines security vulnerabilities in international roaming services, analyzing cross-border attacks, regulatory challenges, and security measures for protecting roaming users and services. The study provides insights into securing roaming infrastructure.
Document
International Roaming
Cross-Border Attacks
Regulatory Compliance
Service Security
User Protection
Roaming Infrastructure
Security Policies
Related Videos

Roaming Security Overview
Overview of international roaming security considerations and challenges

Cross-Border Security
Security challenges in cross-border telecommunications
MoTIF Framework Overview
MoTIF FrameworkOverview of the GSMA MoTIF framework for mobile threat intelligence
AT Commands Security Analysis
AT CommandsSecurity analysis of AT commands and fuzzing techniques
Document Information
- Type: Research Paper
- Date: 2024-01-15
- Source: GSMA Roaming
- Category: Roaming Security
- File: Lange_2024_Wherever_I_May_Roam-Stealthy_Interception_and_Injection_Attacks_through_Roaming_Agreements_author_version.pdf
Dr. Thomas Lee
GSMA Roaming
Roaming Security ExpertDr. Maria Garcia
Black Hat Security Research
Cross-Border SecurityProf. James Wilson
University of Maryland
Telecommunications Policy