Berserker: ASN.1-based Fuzzing of Radio Resource Control Protocol for 4G and 5G

07/05/2021
by   Srinath Potnuru, et al.
0

Telecom networks together with mobile phones must be rigorously tested for robustness against vulnerabilities in order to guarantee availability. RRC protocol is responsible for the management of radio resources and is among the most important telecom protocols whose extensive testing is warranted. To that end, we present a novel RRC fuzzer, called Berserker, for 4G and 5G. Berserker's novelty comes from being backward and forward compatible to any version of 4G and 5G RRC technical specifications. It is based on RRC message format definitions in ASN.1 and additionally covers fuzz testing of another protocol, called NAS, tunneled in RRC. Berserker uses concrete implementations of telecom protocol stack and is unaffected by lower layer protocol handlings like encryption and segmentation. It is also capable of evading size and type constraints in RRC message format definitions. Berserker discovered two previously unknown serious vulnerabilities in srsLTE – one of which also affects openLTE – confirming its applicability to telecom robustness.

READ FULL TEXT

page 5

page 15

research
10/12/2021

Hide and seek with quantum resources: New and modified protocols for quantum steganography

Steganography is the science of hiding and communicating a secret messag...
research
10/02/2019

RecordFlux: Formal Message Specification and Generation of Verifiable Binary Parsers

Various vulnerabilities have been found in message parsers of protocol i...
research
12/08/2021

Tutorial on communication between access networks and the 5G core

Fifth-generation (5G) networks enable a variety of use cases that requir...
research
07/11/2023

Formal and Fuzzing Amplification: Targeting Vulnerability Detection in 5G and Beyond

Softwarization and virtualization in 5G and beyond require rigorous test...
research
07/20/2023

Formal-Guided Fuzz Testing: Targeting Security Assurance from Specification to Implementation for 5G and Beyond

Softwarization and virtualization in 5G and beyond necessitate thorough ...
research
08/21/2023

Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks

Embedded Network Stacks (ENS) enable low-resource devices to communicate...
research
02/09/2020

Message Type Identification of Binary Network Protocols using Continuous Segment Similarity

Protocol reverse engineering based on traffic traces infers the behavior...

Please sign up or login with your details

Forgot password? Click here to reset