Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security 2023
DOI: 10.1145/3576915.3623113
|View full text |Cite
|
Sign up to set email alerts
|

Formal Analysis of Access Control Mechanism of 5G Core Network

Mujtahid Akon,
Tianchang Yang,
Yilu Dong
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 33 publications
0
1
0
Order By: Relevance
“…Yang et al [15] present a formal model of the Authentication and Key Management for Application (AKMA) service used for establishing authenticated communication between users and application functions. Akon et al [16] recently introduced the first scalable formal model of the 5G core network's access control mechanism. The proposed 5GCVerif is an adversary-controlled framework designed for the systematic formal analysis of the access control mechanism of the 5G core network, revealing five new classes of exploitable privilege escalation vulnerabilities in the technical specifications.…”
Section: Related Workmentioning
confidence: 99%
“…Yang et al [15] present a formal model of the Authentication and Key Management for Application (AKMA) service used for establishing authenticated communication between users and application functions. Akon et al [16] recently introduced the first scalable formal model of the 5G core network's access control mechanism. The proposed 5GCVerif is an adversary-controlled framework designed for the systematic formal analysis of the access control mechanism of the 5G core network, revealing five new classes of exploitable privilege escalation vulnerabilities in the technical specifications.…”
Section: Related Workmentioning
confidence: 99%