LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE

@inproceedings{Hussain2018LTEInspectorAS,
  title={LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE},
  author={Syed Rafiul Hussain and Omar Chowdhury and Shagufta Mehnaz and Elisa Bertino},
  booktitle={NDSS},
  year={2018}
}
In this paper, we investigate the security and privacy of the three critical procedures of the 4G LTE protocol (i.e., attach, detach, and paging), and in the process, uncover potential design flaws of the protocol and unsafe practices employed by the stakeholders. For exposing vulnerabilities, we propose a modelbased testing approach LTEInspector which lazily combines a symbolic model checker and a cryptographic protocol verifier in the symbolic attacker model. Using LTEInspector, we have… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 22 CITATIONS

Security and Protocol Exploit Analysis of the 5G Specifications

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Signalling Security Analysis: Is HTTP/2 Secure in 5G Core Network?

  • 2018 10th International Conference on Wireless Communications and Signal Processing (WCSP)
  • 2018
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

A Systematic Way to LTE Testing

VIEW 3 EXCERPTS
CITES BACKGROUND & RESULTS

References

Publications referenced by this paper.
SHOWING 1-10 OF 42 REFERENCES

Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif

  • Foundations and Trends in Privacy and Security
  • 2016
VIEW 22 EXCERPTS
HIGHLY INFLUENTIAL

Defeating IMSI Catchers

  • ACM Conference on Computer and Communications Security
  • 2015
VIEW 13 EXCERPTS
HIGHLY INFLUENTIAL

Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems

Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, Jean-Pierre Seifert
  • NDSS
  • 2015
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

Control-plane protocol interactions in cellular networks

  • SIGCOMM
  • 2014
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

New privacy issues in mobile telephony: fix and verification

  • ACM Conference on Computer and Communications Security
  • 2012
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL