Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 2021
DOI: 10.1145/3460120.3485388
|View full text |Cite
|
Sign up to set email alerts
|

Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…To this end, we assume that any UEs can be malicious, and the communication channel between UEs and RANs is subject to man-in-themiddle (MiTM) attacks [14] such as signal injection [19]. More precisely, we focus on the L3 attack surfaces that exploit unprotected (i.e., not signed or encrypted) cellular messages within the NAS and RRC protocols [38] over the radio frequency (RF) channel, which have been extensively studied [10], [12], [14], [9], [16], [13], [39], [40], [41], [17]. We provide the list of such unprotected messages [21], [20] in Table V (in the Appendix).…”
Section: A Threat Modelmentioning
confidence: 99%
“…To this end, we assume that any UEs can be malicious, and the communication channel between UEs and RANs is subject to man-in-themiddle (MiTM) attacks [14] such as signal injection [19]. More precisely, we focus on the L3 attack surfaces that exploit unprotected (i.e., not signed or encrypted) cellular messages within the NAS and RRC protocols [38] over the radio frequency (RF) channel, which have been extensively studied [10], [12], [14], [9], [16], [13], [39], [40], [41], [17]. We provide the list of such unprotected messages [21], [20] in Table V (in the Appendix).…”
Section: A Threat Modelmentioning
confidence: 99%
“…The increasing sophistication of network attacks poses a significant threat to critical infrastructure across various sectors [43], [44]. Consequently, IDS plays a crucial role in safeguarding computer network systems against malicious activities, whether initiated by internal users or external infiltrators [45].…”
Section: B Intrusion Detection Systemsmentioning
confidence: 99%
“…The growing complexity of network attacks presents a serious risk to various essential infrastructures [44,45]. To counteract this, intrusion detection systems (IDSs) are implemented to protect networks from malicious actions conducted by both insiders and external attackers [46].…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%