Please find the detailed information about the security requirements we studied in our paper below.
Sources of 50 collected security requirements
The summary of confirmed security violation (including generated test procedure and the information of the problematic UEs) are here!
Here are more information about test procedure generation for security requirements, including given initiate state, condition event, expected operation, and the information used to reason the chains for the generation: S1, S2, S3, S13, S16.