PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification

01/01/2021
by   Mitziu Echeverria, et al.
0

End-user-devices in the current cellular ecosystem are prone to many different vulnerabilities across different generations and protocol layers. Fixing these vulnerabilities retrospectively can be expensive, challenging, or just infeasible. A pragmatic approach for dealing with such a diverse set of vulnerabilities would be to identify attack attempts at runtime on the device side, and thwart them with mitigating and corrective actions. Towards this goal, in the paper we propose a general and extendable approach called Phoenix for identifying n-day cellular network control-plane vulnerabilities as well as dangerous practices of network operators from the device vantage point. Phoenix monitors the device-side cellular network traffic for performing signature-based unexpected behavior detection through lightweight runtime verification techniques. Signatures in Phoenix can be manually-crafted by a cellular network security expert or can be automatically synthesized using an optional component of Phoenix, which reduces the signature synthesis problem to the language learning from the informant problem. Based on the corrective actions that are available to Phoenix when an undesired behavior is detected, different instantiations of Phoenix are possible: a full-fledged defense when deployed inside a baseband processor; a user warning system when deployed as a mobile application; a probe for identifying attacks in the wild. One such instantiation of Phoenix was able to identify all 15 representative n-day vulnerabilities and unsafe practices of 4G LTE networks considered in our evaluation with a high packet processing speed ( 68000 packets/second) while inducing only a moderate amount of energy overhead ( 4mW).

READ FULL TEXT

page 7

page 8

page 34

page 35

research
07/30/2022

L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing

Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) is a wireless technolog...
research
11/27/2018

The Untold Secrets of Operational Wi-Fi Calling Services: Vulnerabilities, Attacks, and Countermeasures

Since 2016, all of four major U.S. operators have rolled out nationwide ...
research
10/04/2019

HDMI-Walk: Attacking HDMI Distribution Networks via Consumer Electronic Control Protocol

The High Definition Multimedia Interface (HDMI) is the de-facto standard...
research
04/17/2019

The current state of affairs in 5G security and the main remaining security challenges

The first release of the 5G protocol specifications, 3rd Generation Part...
research
11/13/2019

SynSig2Vec: Learning Representations from Synthetic Dynamic Signatures for Real-world Verification

An open research problem in automatic signature verification is the skil...
research
12/26/2022

Characterizing and Modeling Control-Plane Traffic for Mobile Core Network

In this paper, we first carry out to our knowledge the first in-depth ch...
research
07/27/2020

DICE: Dynamic Interconnections for the Cellular Ecosystem

To enable roaming of users, the cellular ecosystem integrates many entit...

Please sign up or login with your details

Forgot password? Click here to reset