2018
DOI: 10.1007/978-3-662-58387-6_13
|View full text |Cite
|
Sign up to set email alerts
|

Attacks Against GSMA’s M2M Remote Provisioning (Short Paper)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Cellphones can be compromised by different cyber-attacks [79], [80]. For hardened devices with stricter security polices and white listed software, attacks are more difficult in general but they also remain susceptible to physical or over-the-air cloning of USIM [81], [82], for leaking of application layer credentials enabling masquerading attacks, for physical hacking, as well as for thefts or losses of devices. Public safety devices may also rely on centralized security management (for delivery of patches, enforcement of software configuration, updating of security policies, as well as access to revoked certificate information and virus databases) and thus prolonged isolation may damage devices' security levels.…”
Section: Threat Scenarios In the User Device Domainmentioning
confidence: 99%
“…Cellphones can be compromised by different cyber-attacks [79], [80]. For hardened devices with stricter security polices and white listed software, attacks are more difficult in general but they also remain susceptible to physical or over-the-air cloning of USIM [81], [82], for leaking of application layer credentials enabling masquerading attacks, for physical hacking, as well as for thefts or losses of devices. Public safety devices may also rely on centralized security management (for delivery of patches, enforcement of software configuration, updating of security policies, as well as access to revoked certificate information and virus databases) and thus prolonged isolation may damage devices' security levels.…”
Section: Threat Scenarios In the User Device Domainmentioning
confidence: 99%
“…The evolution towards next generation telecommunications is exciting, but not without risk; flawed systems have the potential to cost society dearly, in terms of both lost liberties and financial costs. As such, similarly to the security analysis done by Meyer et al in [15], it will be important to analyze in detail the mechanisms behind remote provisioning to be sure that the properties offered by the current model will hold for eUICCs, especially in term of security as it is paramount for operators. Such an overview is helping in that regard by easing the comprehension of those technical specification.…”
Section: Closing Remarksmentioning
confidence: 99%