2021
DOI: 10.48550/arxiv.2101.00328
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification

Abstract: End-user-devices in the current cellular ecosystem are prone to many different vulnerabilities across different generations and protocol layers. Fixing these vulnerabilities retrospectively can be expensive, challenging, or just infeasible. A pragmatic approach for dealing with such a diverse set of vulnerabilities would be to identify attack attempts at runtime on the device side, and thwart them with mitigating and corrective actions. Towards this goal, in the paper we propose a general and extendable approa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 28 publications
(80 reference statements)
0
3
0
Order By: Relevance
“…Therefore, to UEs, the behavior and location of the cell are legitimate. As proposed in [11], a signature based anomaly detector with a signature: "if Identity Request, then attack", is successful in the detection of our attack. However, because Identity Requests are also sent during a legitimate protocol flow, such a solution will inherently report false positives during legitimate identification procedures.…”
Section: Overshadowing With Identity Requestmentioning
confidence: 94%
“…Therefore, to UEs, the behavior and location of the cell are legitimate. As proposed in [11], a signature based anomaly detector with a signature: "if Identity Request, then attack", is successful in the detection of our attack. However, because Identity Requests are also sent during a legitimate protocol flow, such a solution will inherently report false positives during legitimate identification procedures.…”
Section: Overshadowing With Identity Requestmentioning
confidence: 94%
“…On a higher layer, separating a legitimate rejection from a bogus one could be possible by identifying the absence of a message authentication code. In [5], Echeverria et al tried to identify an attach, service or authentication reject attack originating from a fake base station, but other than the presence of the reject message, they could not identify any characteristic that would clearly separate the attack from a legitimate rejection.…”
Section: Detectionmentioning
confidence: 99%
“…In these works, the authors detect fake base stations due to their unusual broadcast configuration, location, or other indicators. In [5], the authors do not use lower layer indicators to detect the presence of a fake base station, but rather rely on the protocol trace of the interaction with the fake base station. Fake Base Station Attack Impact.…”
Section: Related Workmentioning
confidence: 99%