Keystroke Recognition Using WiFi Signals
https://www.sigmobile.org/mobicom/2015/papers/p90-aliA.pdfUSBee: Air-Gap Covert-Channel via Electromagnetic Emission from USB
https://cyber.bgu.ac.il/t/USBee.pdfDEF CON 18 - Chris Paget - Practical Cellphone Spying
Practical Cellphone Spying - Slides
http://index-of.es/Miscellanous/LIVRES/cellphonespying.pdfVulnerabilities of Signaling System Number 7 (SS7) to cyber attacks and how to mitigate Againt these vulnerabilities
http://wiredspace.wits.ac.za/jspui/bitstream/10539/20048/2/Final%20Research%20Report.pdfHacking mobile network via SS7: interception, shadowing and more
http://secuinside.com/archive/2015/2015-2-7.pdfMartin Kacer, Philippe Langlois : SS7 Attacker Heaven turns into Riot: How to make Nation-State and Intelligence Attackers’ lives much harder on mobile networks - Slides
https://www.blackhat.com/docs/us-17/wednesday/us-17-Kacer-SS7-Attacker-Heaven-Turns-Into-Riot-How-To-Make-Nation-State-And-Intelligence-Attackers-Lives-Much-Harder-On-Mobile-Networks.pdfSS7 Attacker Heaven turns into Riot: How to make Nation-State and Intelligence Attackers’ lives much harder on mobile networks - Paper
https://www.blackhat.com/docs/us-17/wednesday/us-17-Kacer-SS7-Attacker-Heaven-Turns-Into-Riot-How-To-Make-Nation-State-And-Intelligence-Attackers-Lives-Much-Harder-On-Mobile-Networks-wp.pdfPhilippe Langlois : Toward the HLR, attacking the SS7 & SIGTRAN applications.
https://www.h2hc.com.br/repositorio/2009/files/Philippe.en.pdfSignaling System 7 (SS7) Security Report
https://www.ptsecurity.com/upload/ptcom/SS7_WP_A4.ENG.0036.01.DEC.28.2014.pdfOpenBTS | Open Source Cellular Infrastructure
http://openbts.org/Security in the GSM network
https://ipsec.pl/files/ipsec/security_in_the_gsm_network.pdfDecrypting GSM phone calls – Security Research Labs
https://srlabs.de/bites/decrypting-gsm/Files - A5/1 Decryption - SRLabs Open Source Projects
https://opensource.srlabs.de/projects/a51-decrypt/filesSMS zero
Breaking The GSM A5/1 Cryptography Algorithm with Rainbow Tables and High-end FPGAs
http://www.fpl2012.org/Presentations/F2C2.pdfGSM network and its privacy - the A5 stream cipher
P1 Security
http://www.p1sec.com/corp/Threats and Countermeasures in GSM Networks
JavaScript PDU Mode SMS Decoder
https://smspdu.benjaminerhart.com/