I. Introduction
With billions of subscribers, Long Term Evolution (LTE) is one of the most fundamental communication technologies in modern society. It has thus become the target of various attacks. Generally, current research on LTE security includes attack detection and validation. Whereas the former may differ because of different methodologies, researchers usually leverage open-source projects to validate attacks [1]–[8] because of the high cost of commercial stack implementations and inaccessibility to facilities of mobile operators.