2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS) 2021
DOI: 10.1109/icdcs51616.2021.00079
|View full text |Cite
|
Sign up to set email alerts
|

ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0
3

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 27 publications
0
5
0
3
Order By: Relevance
“…An Authentication Synchronization Failure Attack forces the victim UE to suffer from service disruption [27]. The concept involves disrupting the attach procedure by intentionally creating a mismatch in the sequence numbers stored in the UE and the HSS.…”
Section: Fake User Equipmentmentioning
confidence: 99%
See 1 more Smart Citation
“…An Authentication Synchronization Failure Attack forces the victim UE to suffer from service disruption [27]. The concept involves disrupting the attach procedure by intentionally creating a mismatch in the sequence numbers stored in the UE and the HSS.…”
Section: Fake User Equipmentmentioning
confidence: 99%
“…In a Service Disruption using Authentication Request Attack, the adversary exploits a specification flaw related to the handling of sequence numbers of the Authentication Request message [27]. In order to perform the attack, the adversary first sends an Attach Request to the MME using malicious UE (using the victim's IMSI) and captures the Authentication Request message.…”
Section: Fake User Equipmentmentioning
confidence: 99%
“…Ao longo das diversas gerações de redes móveis, várias falhas de implementação e abusos de protocolos foram descobertos [7]- [9]. As falhas mais recentes vêm sendo encontradas através da análise estática e dinâmica automatizada das implementações dos modelos definidos pelos padrões 3GPP.…”
Section: Segurança Em 5g E O-ranunclassified
“…As falhas mais recentes vêm sendo encontradas através da análise estática e dinâmica automatizada das implementações dos modelos definidos pelos padrões 3GPP. Esta análise só é possível devido à existência das pilhas de rede implementadas em código aberto, como srsLTE e OpenAir Interface [9]. Já as soluções proprietárias só podem ser avaliadas utilizando-se metodologia caixa preta [7,8].…”
Section: Segurança Em 5g E O-ranunclassified
See 1 more Smart Citation