Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks 2019
DOI: 10.1145/3317549.3326310
|View full text |Cite
|
Sign up to set email alerts
|

Basebads: Automated security analysis of baseband firmware

Abstract: Mobile devices are more connected than ever before through the use of multiple wireless protocols, including the 2G, 3G, and 4G cellular standards. To manage and interact with cellular networks, phones use dedicated and highly proprietary baseband processors running custom, closed-source firmware. Despite the increasing complexity of modern cellular standards, there is no reference implementation, leading individual baseband manufacturers to create their own in-house versions. The proprietary nature of baseban… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(11 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…However, POLYSCOPE scripts are not authorized to access all files, particularly those owned by root, so we run these scripts on rooted phones. Recent work by Hernandez et al [19] is able to extract MAC policy and part of DAC configuration from Android firmware images without rooting devices. However, this approach cannot extract all files located in some directories like /data.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, POLYSCOPE scripts are not authorized to access all files, particularly those owned by root, so we run these scripts on rooted phones. Recent work by Hernandez et al [19] is able to extract MAC policy and part of DAC configuration from Android firmware images without rooting devices. However, this approach cannot extract all files located in some directories like /data.…”
Section: Methodsmentioning
confidence: 99%
“…Traditionally, research only considered one access control policy at a time. Researchers have recently proposed techniques to reason about MAC and DAC policies in combination [7,19], but they have not considered how to compose subjects and objects from multiple policies systematically. As Android includes new access control mechanisms, such as Scoped Storage, how to characterize subjects and objects accurately across multiple policies becomes challenging.…”
Section: Limitations Of Current Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…In contrast to static program analysis and emulation-based fuzzing, LTEFuzz performs over-the-air analysis on LTE and found vulnerabilities in various mobile devices and core network components [32]. Moreover, SpikerXG wirelessly fuzzes 2G on multiple smartphones in parallel, including a packet mutator using YateBTS [28,45]. Such approaches are feasible for 2G and LTE, because open source projects like OpenAir-Interface and srsLTE already implement a lot of common protocol features on SDRs [38,44].…”
Section: Related Workmentioning
confidence: 99%
“…LTEFuzz by Kim et al [32] uses predefined test cases to identify implementation problems of a baseband. SpikerXG by Hernandez et al [24] fuzz firmware of Android devices and propose an analysis platform for further rehosting and analysis will be possible, taking a big step towards automated baseband analysis. Prior publicly known baseband fuzzing setups fuzzed leaked binaries compiled for host system [35].…”
Section: Baseband Researchmentioning
confidence: 99%