0% found this document useful (0 votes)
69 views15 pages

Lteinspector:: A Systematic Approach For Adversarial Testing of 4G Lte

This paper proposes an approach called LTEInspector for systematically testing the security of 4G LTE protocols. LTEInspector combines symbolic model checking and cryptographic protocol verification to analyze models of the attach, detach, and paging procedures. Using LTEInspector, the authors uncovered 10 new attacks on these procedures and validated 8 of them on a real testbed. A notable finding is an authentication relay attack that allows spoofing a legitimate user's location without proper credentials.

Uploaded by

gpgeorgiev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views15 pages

Lteinspector:: A Systematic Approach For Adversarial Testing of 4G Lte

This paper proposes an approach called LTEInspector for systematically testing the security of 4G LTE protocols. LTEInspector combines symbolic model checking and cryptographic protocol verification to analyze models of the attach, detach, and paging procedures. Using LTEInspector, the authors uncovered 10 new attacks on these procedures and validated 8 of them on a real testbed. A notable finding is an authentication relay attack that allows spoofing a legitimate user's location without proper credentials.

Uploaded by

gpgeorgiev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

LTEInspector: A Systematic Approach for

Adversarial Testing of 4G LTE

Syed Rafiul Hussain Omar Chowdhury Shagufta Mehnaz Elisa Bertino


Purdue University The University of Iowa Purdue University Purdue University
[email protected] [email protected] [email protected] [email protected]

Abstract—In this paper, we investigate the security and pri- identified design weaknesses of the 3GPP (Third Generation
vacy of the three critical procedures of the 4G LTE protocol (i.e., Partnership Project) standard [3], [4] and unsafe practices by
attach, detach, and paging), and in the process, uncover potential the responsible stakeholders [5], [6], [7], [8], [9], [10], [11],
design flaws of the protocol and unsafe practices employed by the [12], [13], [14], [15], [16], [17]. Such work, however, has at
stakeholders. For exposing vulnerabilities, we propose a model- least one of the following limitations: (A) Analyses do not
based testing approach LTEInspector which lazily combines a
symbolic model checker and a cryptographic protocol verifier
use systematic methodologies for attack discovery [5], [6], [7],
in the symbolic attacker model. Using LTEInspector, we have [8], [9], [10], [11], [12], [13], [15]; (B) Analyses focus on
uncovered 10 new attacks along with 9 prior attacks, cate- prior generations of the protocols only, and hence some of the
gorized into three abstract classes (i.e., security, user privacy, findings do not directly apply to 4G LTE [5], [6], [7], [8], [9],
and disruption of service), in the three procedures of 4G LTE. [10], [11], [12], [16]; (C) Analyses do not explicitly reason
Notable among our findings is the authentication relay attack that about adversarial actions [17].
enables an adversary to spoof the location of a legitimate user
to the core network without possessing appropriate credentials. Problem and scope. The 4G LTE protocol can be viewed
To ensure that the exposed attacks pose real threats and are as an amalgamation of multiple critical procedures, such as
indeed realizable in practice, we have validated 8 of the 10 new attach, paging, detach, handover, and calls — to name a few.
attacks and their accompanying adversarial assumptions through Each of these procedures is complex and requires an in-depth
experimentation in a real testbed. security and privacy analysis of its own. Among the different
procedures, attach, paging, and detach are critical for the
I. I NTRODUCTION correct and reliable functionality of the other procedures. For
instance, without a correct and secure attach procedure (i.e.,
The adoption of Fourth generation Long Term Eval-
the initial secure connection setup), the security bootstrapping
uation (4G LTE)—the de facto standard for cellular
process is likely to be vulnerable; this may have serious
telecommunication—has seen a stable growth in recent years,
consequences, such as man-in-the-middle attacks, spurious
replacing prior generations due to its promise of improved
mobile billing, or even life threatening risks. This paper thus
assurances (e.g., higher bandwidth, reliable connectivity, en-
addresses the following central research question: is it possible
hanced security). Cellular networks which are part of a nation’s
to develop a systematic approach for scrutinizing the attach,
critical infrastructure not only influence our society as a whole
detach, and paging procedures to uncover vulnerabilities that
(e.g., business, public-safety message dissemination) but also
can be shown to be realizable in practice by an adversary?
can impact us at a more personal level by enabling applica-
tions that often improve our quality of life (e.g., navigation). Challenges. Any testing approach analyzing the security and
Because of their ubiquitous presence and use for critical appli- privacy of the 4G LTE protocol needs to address the following
cations, cellular networks are, however, attractive attack targets challenges: (a) Specification: The cellular protocol lacks a for-
for malicious parties. Resourceful adversaries (e.g., nation- mal specification, and the standard [3], [4] often suffers from
states, foreign intelligence agencies, terrorists) can wreak ambiguity and under-specification. (b) Protocol Complexity:
havoc by exploiting vulnerabilities of the cellular network The cellular protocol—comprising of multiple (cryptographic)
ecosystem (e.g., surveillance [1], cyberwarfare [2]). It is hence sub-protocols—is stateful in nature [17]. Also, analyses will
pivotal to investigate the existing design and deployments of likely experience scalability challenges due to the presence of
cellular networks for detecting potential vulnerabilities. multiple types of protocol participants, and messages contain-
ing data with a large domain. (c) Closed system: A majority of
There is already a substantial work that has analyzed the the deployed cellular systems are proprietary and closed sys-
security and privacy of telecommunication systems, and also tems which require any testing approach to be black-box and
system-agnostic. (d) Legal barrier: Regulatory requirements
[18] prohibit transmission in the licensed spectrum making
dynamic network testing and attack validation challenging.
Network and Distributed Systems Security (NDSS) Symposium 2018
18-21 February 2018, San Diego, CA, USA Approach. For analyzing the critical procedures of 4G LTE,
ISBN 1-1891562-49-5 in this paper, we take a first step by proposing LTEInspector
http://dx.doi.org/10.14722/ndss.2018.23313 which employs a property-driven adversarial model-based test-
www.ndss-symposium.org
ing philosophy. LTEInspector considers the standard symbolic
adversary model (alternatively known as the Dolev-Yao model
[19]) for its analysis. LTEInspector takes the relevant 4G LTE report π to be a feasible vulnerability. If, however, there exists
abstract model M and a desired property ϕ, and tries to find a one adversary action in π which is not feasible, we refine the
violation of ϕ in M. The set of properties that LTEInspector property ϕabs to rule out traces in which the adversary takes
aims to check include authenticity (e.g., disallowing imperson- that action. The analysis is then run again with the refined
ation), availability (e.g., preventing service denial), integrity property. For further confidence, we validate π by concretely
(e.g., restricting unauthorized billing), and secrecy of user’s executing it in a testbed.
sensitive information (e.g., preventing activity profiling).
Finally, we show the application of a technique we call
As a prerequisite of LTEInspector’s analysis, we first attack chaining in which seemingly low-impact attacks are
construct the 4G LTE ecosystem model by consulting the stitched together to yield a damaging high-impact attack. We
standard [3], [4]. Our model M (publicly available in https: show its successful application by chaining together attacks,
//github.com/relentless-warrior/LTEInspector) captures the ab- exposed using LTEInspector, to allow an adversary to carry
stract functionality (ignoring low-level implementation details) out an authentication relay attack in the 4G LTE network.
of the 4G LTE ecosystem—only relevant to the analysis of the Findings. Notable among our findings is the authentication
three procedures—as synchronous communicating finite state relay attack which enables an adversary to connect to the core
machines (FSM). Each FSM captures the stateful functionality networks—without possessing any legitimate credentials—
of a protocol participant’s (i.e, user’s cellular device and the while impersonating a victim cellular device. Through this
core network) at the Non-Access Stratum (NAS) protocol attack the adversary can poison the location of the victim
layer [3], [4]. The two FSMs communicate with each other device in the core networks, thus allowing setting up a false
through public (adversary-controlled) communication channels alibi or planting fake evidence during a criminal investigation.
by sending each other NAS layer messages.
Other notable attacks reported in this paper enable an
Our analysis is an instance of the parameterized system adversary to obtain user’s coarse-grained location information
verification problem (i.e., parameterized by the number of and also mount denial of service (DoS) attacks. In particular,
protocol participants) which is generally undecidable [20]; using LTEInspector, we obtained the intuition of an attack
achieving both soundness and completeness is thus impos- which enables an adversary to possibly hijack a cellular
sible. Consequently, we follow the conventional method of device’s paging channel with which it can not only stop
aiming for soundness instead of completeness, that is, if our notifications (e.g., call, SMS) to reach the device but also can
approach reports a violation, it is indeed a violation; we cannot, inject fabricated messages resulting in multiple implications
however, detect all violations. Also, checking compliance including energy depletion and activity profiling.
of the protocol model against desired security and privacy
properties often requires simultaneously reasoning about: (➊) Contributions. In summary, the paper makes the following
temporal ordering of different events/actions (i.e., trace prop- technical contributions:
erties such as response properties [21]), (➋) cryptographically- (1) We propose LTEInspector—a systematic model-based
protected messages and constructs (e.g., encryption, hashing), adversarial testing approach—that leverages the combined
and (➌) other rich constraints (e.g., linear integer arithmetic power of a symbolic model checker and a protocol verifier
constraints). General purpose model checkers [22], [23] have for analyzing three critical procedures (i.e., attach, detach,
shown promise in successfully reasoning about properties and paging) of the 4G LTE network. The general principle
concerning ➊ and ➌. Cryptographic protocol verifiers [24], employed by LTEInspector is to be tool-agnostic, that is, it can
[25], [26], [27], [28], [29], although proficient in verifying be instantiated through any generic symbolic model checker
cryptography related properties, for tractability reasons only and cryptographic protocol verifier.
provide primitive support at best for properties concerning ➊ (2) We show the effectiveness of our approach in finding
and ➌. This naturally leads us to the question: is it possible new vulnerabilities as well as 9 prior attacks. Our approach
to get the best of both these techniques? has contributed to exposing 10 new attacks.
(3) We show that the majority of our new attacks (i.e., 8 out
To this end, LTEInspector lazily (or, on an on-demand of 10) are realizable in practice through experimentation in a
basis) combines the reasoning powers of a symbolic model low cost (i.e., $3, 900), real test-bed while adhering to ethical,
checker and a cryptographic protocol verifier. To the best of legal, and moral practices.
our knowledge, in the context of 4G LTE, the use of symbolic
model checking and a cryptographic protocol verifier to reason
II. LTE P RELIMINARIES
about rich temporal trace properties is novel. In this approach,
we first abstract away all cryptography-related constructs from In this section, we provide a brief primer of 4G LTE. For
the model M and the desired property ϕ and only reason the ease of exposition, we simplify the network architecture
about aspects ➊ and ➌ of the ϕ (denoted by ϕabs ). For any substantially (see Figure 1) and only focus on the aspects
violation of ϕabs in M, the symbolic model checker would relevant to the attach, detach, and paging procedures.
yield a counterexample π demonstrating the violation. Now, A. LTE Network Architecture
π may include adversary actions which may not be realizable
The LTE network is broadly comprised of the following
due to cryptographic assumption violations (e.g., constructing a
three components: the cellular device (also known as user
valid ciphertext of a message without possessing the encryption
equipment or UE), the radio access network (or, (E-UTRAN),
key). To rule out such cases, for each adversary action in π, we
and the core network or Evolved Packet Core (EPC).
query a cryptographic protocol verifier to check the action’s
feasibility with accordance to the cryptographic assumptions. UE: UE is the cellular device equipped with a universal
In case all adversary actions in π turn out to be feasible, we can subscriber identity module known as SIM card. The SIM card

2
procedures—without fine-grained implementation details—as the case MC finds an execution π of Madv which violates ϕ,
two synchronous communicating finite state machines (FSM) MC outputs π as an evidence of the violation (also, known as
(denoted by Mvanilla ). The two FSMs in Mvanilla (one for the the counterexample). π includes the adversary actions which
UE and another for the MME) communicate with each other were used to violate ϕ, and alternatively, can be viewed as
by sending messages through public communication channel. the attack strategy. The Adv−c used when model checking
We model the communication channel between the two FSMs Madv does not have the necessary cryptographic proficiency
MUE and MMME with two uni-directional channels; one of Adv+c (i.e., A-3), and hence π can violate cryptographic
from MUE to MMME and another from MMME to MUE . assumptions, making it unrealizable in practice. We rule out
The choice of two unidirectional channels instead of a single such spurious πs through the following process.
bidirectional channel is not only for modeling convenience
Validating counterexamples with CPV. For a given coun-
but also for effortlessly modeling weaker adversaries than
terexample π, we check each sub-step of π that requires
Adv+c during adversary model instrumentation (e.g., only one
manipulating some crytographically-protected message type.
direction of the public channel to be adversary controlled).
We model each small sub-step in a CPV, denoted as Mcrypto .
To keep the analysis tractable, in Mvanilla , we do not We then pose a query to CPV that will be violated in Mcrypto
model message data with arbitrarily large domains. For in- only if the Adv+c has the specific capability that π requires.
stance, the attach request message can possibly contain IMSI For few message types, such as, paging, we know from the
as a data; in our model, we do not capture the IMSI 3GPP standard that there are no confidentiality and integrity
and just model attach request as a possible message type. protections; for those message types we do not invoke the
We, however, model message data-dependent conditions as CPV.
environment-controlled (or, in short, environmental) Boolean
Testbed experimentation. Once both MC and CPV ad-
variables. For instance, for each message that can have in-
judicate a given π to be feasible, we try to realize this
tegrity protection, we capture its integrity verification with a
attack in a testbed. This is essential because π may not be
unique Boolean variable mac failure whose value is nonde-
realizable in practice due to possible technical safeguards. Any
terministically set by the environment during model checking.
π validated in the testbed experiment can thus be considered
Mvanilla can capture an unbounded number of sequential ses-
a vulnerability. We built a testbed using low-cost software
sions. It, however, can neither capture an unbounded number
defined radios and open-source LTE software stack having a
of parallel sessions nor an unbounded number of protocol
price tag of around $3, 900 which we would argue is within
participants; the latter is shown to be undecidable [34].
the reach of a motivated adversary.
Adversarial model instrumentor. The adversarial model in-
strumentor takes Mvanilla and instruments it to incorporate C. Example Demonstrating LTEInspector’s Effectiveness
the presence of an adversary to obtain a new model Madv . We now show the effectiveness of LTEInspector’s vul-
We model a cryptography-agnostic adversary Adv−c which nerability detection through a concrete example. For ease of
possesses the same capabilities of Adv+c except for its crypto- exposition, we rely on a simplified and partial model of the
graphic proficiency (i.e., A-3). We model the Adv−c capabili- LTE ecosystem shown in Figure 4 for this example.
ties for each unidirectional public channel ch in the following
In the example, the UE FSM (the top FSM) has 3 states
manner. Capability A-1 is modeled as ch’s property, that is, ch
and 9 transitions whereas the MME FSM (the bottom FSM)
nondeterministically drops any message msg passing through
has 3 states and 6 transitions. Transition labels are of the
it (represented as a no operation) or replaces it with another
form “condition/actions” in which condition is a proposi-
plausible message including the current message msg.
tional logic formula specifying the condition under which the
Modeling capability A-2 for ch requires considering an transition will be triggered whereas the actions component
adversarial FSM which nondeterministically injects one of refers to a sequence of actions that will be performed (in their
the possible messages including no operation. We call such appearance order) by the FSM after the transition is taken.
adversary FSMs the injection adversaries. In the case both Although the actions component can be empty (denoted with
the legitimate protocol participant and the adversary simulta- –), the condition component cannot be empty. We represent
neously push messages msgv and msgadv , respectively, into the states with barebone arrows (i.e., arrows with no condition
ch, the message received on the other side is decided by and action) as the initial states of the FSMs. We use ➊,
the value of an environmental Boolean variable adv turn; ➋,. . . to denote the UE transitions whereas we use ➀, ➁,. . . ,
the value of adv turn is nondeterministically chosen by the to denote the MME transitions. The FSMs have the following
environment. Precisely, the other side of ch will receive environmental variables: mobile restart (signifying UE reboot-
msgadv only if the value of adv turn is set to be true by the ing); mac failure (improper MAC for auth request message);
environment. The nondeterministic behavior of the channels xres matches sres (correct authentication response message
and the injection adversaries are crucial for reasoning about for a given authentication request message). Both the FSMs
all possible adversary strategies. Our instrumentation makes start with their respective sequence numbers to be 0.
it effortless to customize the capabilities of the adversary, for
The response property we want to verify is the following:
instance, independently making each ch to have adversarial
“It is always the case that whenever the UE FSM is in the
interference.
wait for auth request state, it will eventually move to the
General-purpose Model Checker (MC). MC takes as input state where the UE authenticates the MME” (denoted by ϕ1 ).
Madv and a desired abstract property ϕ, and checks to see The property is desirable as its violation signifies a denial-
whether all possible executions of Madv (considering all of-service attack in which the UE cannot proceed to the next
possible values of the environmental variables) satisfy ϕ. In stage of the attach procedure after initiating it.

5
+-*.'(&/-&)* 0
5678'9:;:<7 3 =:75<8'9:>6:?7 , @ +-*.'(&/-&)* 0 (1mac_failure 0 (UE_sqn 2 xsqn
(mac_failure 3 1(UE_sqn 2 xsqn 2 2 UE_sqn + range)) , UE_sqn =
ID MC property details 6 xsqn + 1, auth_response
UE_sqn + range)) ,4auth_failure
ϕ1 It is always the case that whenever the UE FSM is 2 7
in the wait for auth request state, it will eventu- !"#$%&'(&)*+(* , attach_request
ally move to the state where the UE authenticates 8
the MME. +-*.'(&/-&)* 0
(1mac_failure 0 (UE_sqn 2
ϕ2 Refinement over ϕ1 : Once UE FSM moves to the !"#$%&'(&)*+(* UE UE
UE , attach_request
xsqn 2 UE_sqn + range))
wait for &auth request state, the environment 1 waits for 5 authenticates
will never set the value of mobile restart to be disconnected
auth_request , UE_sqn = xsqn + 1, MME
true. 5678'9:;:<7 3 auth_response
ϕ3 Refinement over ϕ2 : mac failure is never set to 4 =:75<8'9:>6:?7 , @ 9
true by the environment. 3 +-*.'(&/-&)* 0
!"#$%&'(&)*+(* (mac_failure 3 1(UE_sqn 2 xsqn 2 UE_sqn +
ϕ4 Refinement over ϕ3 : UE FSM never receives the , attach_request range)) ,4auth_failure
detach req message. d
ϕ5 Refinement over ϕ4 : UE FSM never receives the Attacker-controlled UE to MME channel d Attacker-controlled MME to UE channel
auth reject message.
auth_failure , @
2 5
Table I: MC properties used in attach_request , auth_response 0
xres_matches_sres ,
the motivating example. MME_sqn = MME_sqn + 1,
MME C&B-($*D'!"E&'B"!!+FE MME
MME +-*.'(&/-&)*
1 waits for authenticates
ID CPV property details disconnected
auth_response 0 auth_response attach_request , MME_sqn UE
Ψ1 Every attach request message received by 1xres_matches_sres , = MME_sqn + 1,
+-*.'(&/-&)*
the MME should be preceded by a unique 3 +-*.'(&A&B*
6
attach request message sent by the UE. 4
attach_request , MME_sqn
= MME_sqn + 1, +-*.'(&/-&)*
Table II: CPV Properties used in
the motivating example. Figure 4: A simplified LTE ecosystem model.

When ϕ1 is checked against the given Madv , it gives the Attack 2: We then check Madv against ϕ4 , and it yields an-
trivial counterexample π in which after the UE FSM moves other similar π in which the UE FSM receives an auth reject
to the wait for auth request state, it continuously observes message (triggering transition ➍); this moves the FSM to the
the value of the environmental variable mobile restart to be disconnected state. Again, one needs to determine whether the
true (triggering transition ➌)—signifying the repeated restart adversary can fabricate an auth reject message. A close in-
of the UE—which even though plausible, is not interesting spection of the standard revealed that the auth reject message
as the Adv+c has no control over UE reboot. One possible is never integrity protected and our experimentation validated
way of removing this π is to refine ϕ1 to add the restriction it. In a similar way, we refine ϕ4 to exclude any auth reject
that once UE FSM moves to the wait for auth request state, message and obtain our final property ϕ5 .
the environment will never set the value of mobile restart
to be true. When this refined property (denoted by ϕ2 —see Attack 3: Finally, checking Madv against ϕ5 with MC results
Table I) is checked, the MC yields a π in which all the in a very interesting π in which the adversary sends the
auth request messages received by the UE fails the MAC range (a UE-specific constant non-negative integer) number
verification (triggering transition ➋) because the MC assigns of fake attach request messages to the MME, before the UE
the value of the mac failure to be continuously true. We then reboots and sends the attach request. After receiving each
refine ϕ2 further to ensure that mac failure is never set to true attach request message, the MME increases its own sequence
by the MC and obtain the property ϕ3 . number (according to transitions ➀ and ➃) and uses the value
of the sequence number to provide replay protection to the
Attack 1: Checking Madv against ϕ3 using MC yields auth request message which it sends to the UE. As the UE
another π in which after UE FSM moves to the wait for is still in the disconnected state (with its sequence number 0,
auth request state, it receives a network initiated detach i.e., U E sqn = 0) and there is no transition that is triggered
request (detach req)–injected by the adversary—triggering by the auth request when the UE is in the disconnected
transition ➍ which moves it to the disconnected state and due state (see Figure 4), these auth request messages are ignored.
to avoiding reboot after transitioning to wait for auth request Then the UE observes a mobile restart (triggering transition
state (in ϕ2 ), stops the UE FSM to get out of the disconnected ➊) and sends an attach request to the MME which the
state. This is a legitimate attack and we would like to know adversary allows to reach the MME. After the MME receives
whether it is possible for the attacker to forge a network initi- it (transitions ➀, ➃, and ➅), the MME as usual responds
ated detach request. A close inspection of the standard reveals with an auth request with the sequence number range + 1.
that once the security context has been established between The adversary also allows the auth request from the MME
the UE and the MME, the network initiated detach request to reach the UE. Upon receiving the message, the UE checks
should be integrity protected only. Our experiment with the for mac failure (which cannot be true as we excluded it while
UE, however, revealed that the UE does not actually check refining ϕ2 to obtain ϕ3 ) and checks whether the received
the validity of the MAC for detach req even in the case the sequence number from MME (denoted with xsqn) satisfies
security context has been established. This means such an the following: U E sqn ≤ xsqn ≤ U E sqn + range; this
attack is plausible and we have verified it in our testbed. We condition will fail as xsqn = range + 1 resulting in the
then refine ϕ3 further to exclude this π and ensure that the UE UE not being able to attach with the MME. To ensure that
FSM never receives the network initiated detach request; as a validity of the π, one has to verify whether the Adv−c can
result, we obtain the refined property ϕ4 . inject a fake attach request message; we use the CPV to

6
validate it. We pose an injective-correspondence [32] query, Such a threat is very practical and has been validated through
Ψ1 (shown in Table II) which asserts that every attach request experimentation in our testbed (see Section V-A1).
message received by the MME should be preceded by a unique
attach request message sent by the UE. The CPV produced Detection. We exposed this attack by first model checking
an attack in which the adversary injected an attach request; Madv with respect to a refinement ϕ5 of the following
validating the desired sub-step of π. We have also observed the property: “It is always the case that whenever the UE FSM
feasibility of this attack in our testbed. We call this attack the is in the wait for auth request state, it will eventually move
authentication synchronization failure attack; this attack is to the state where the UE authenticates the MME” (see Table
also applicable against a recent proposal for defeating IMSI I for details). We observed a violation of ϕ5 in Madv where
catchers [16]. One of the challenges of detecting such an the Adv−c fabricates attach request messages and sends them
attack through CPVs is to precisely capture the sanity check to the MME. To validate the Adv−c ’s capability of forging an
corresponding to the sequence number. It is not immediately attach request message, we leverage ProVerif which showed
clear to us how one would directly capture such a requirement that forging attach request messages are possible; validating
in the CPV in a fine-grained fashion. The MC, however, can the feasibility of the attack.
efficiently reason about such requirement precisely. This shows Malicious Victim
the effectiveness of combining a MC with a CPV for attack MME HSS
UE UE
discovery. 5ÌÊÇ :
attach_request (+/5+) +/5+ JEs
attach_request (+/5+)
This example demonstrates the analysis power of +/5+ JEt
attach_request (+/5+)
LTEInspector’s approach, that is, based on the violation of +/5+ JEI
attach_request (+/5+) +/5+
a single desired property (and, its refinements) LTEInspector 4#0&á #760á :4'5á %-á
JEIEs
authentication_request
was able to find three different attacks which have been shown for :530 L J E I E s
+-á :530 L J E I E s;
to be realizable in practice. As we will demonstrate later, }z O „}z - }z E ˜‡”‹
Attacks 1 or 2 can be stitched with a relay attack to yield authentication_failure
(OUJ? B=EHQNA)
the authentication relay attack.
Figure 5: Authentication synchronization failure attack.
D. Implementation
Attack description: The steps of this attack are shown in
We now discuss some additional details of LTEInspector. Figure 5. It is very similar to the description of Attack 3 in
MC and CPV: We instantiate LTEInspector’s MC compo- Section III-C with one caveat. It is just not sufficient to send the
nent with NuSMV [22] and use ProVerif [24] for CPV. same attach request message m times (where m > range).
The malicious UE needs to send different security capabilities
Model. We manually construct the abstract LTE model by (by selecting different encryption and integrity protection
consulting the 3GPP standard [3], [4]. Our model has a total algorithms) in successive attach request messages. This is
of 13 states and 107 transitions. Our current model and the crucial as the HSS only processes an attach request message
respective properties are publicly available at https://github. only if one or more of the information elements in the current
com/relentless-warrior/LTEInspector. attach request message differs from the already received one.
Properties. Our properties were extracted from the 3GPP In which case, in accordance to subclause 5.5.1.2 of 3GPP
standard [3], [4]. We have tested Madv against 14 properties standard [35], the previously initiated attach procedure is
in total in which 7 properties were analyzed with NuSMV aborted and the new attach request message is processed
whereas 7 properties were analyzed with ProVerif. Note that, (including, the increment of the sequence number).
we do not claim our list of properties to be exhaustive. Re-synchronization: When the sequence number sanity check
fails on the UE side, it sends an auth failure message
IV. LTEI NSPECTOR F INDINGS (cause: sync. failure) to the EPC with AU T S parameter
In this section, we highlight the findings of LTEInspector. containing the UE’s current sequence number resulting in the
For readers’ convenience, we have provided a summary of the EPC to re-synchronize its sequence number. Even after re-
attacks and their implications in Table III. synchronization, the adversary can continue repeating step 1
to make the UE and the HSS sequence numbers to go out-of-
A. Attacks Against Attach Procedure sync again; preventing the UE from connecting to the EPC.
We now present our findings on the attach procedure. Implication: The major implication of this attack is the service
A-1 Authentication Synchronization Failure Attack: This disruption suffered by the victim UE.
attack exploits the UE’s sequence number sanity check to
A-2 Traceability Attack: This attack exploits the re-
disrupt its attach procedure. Precisely, the adversary interacts
sponses of security mode command messages to track a
with the HSS through the MME to ensure that the sequence
particular victim UE. Typically during the attach procedure, the
numbers of the UE and the HSS are out-of-sync. As a result,
MME uses the security mode command message to choose
the authentication challenge received through the legitimate
one of the UE-supported cipher suites to use for communi-
auth request message fails the UE’s sanity check and conse-
cation. When the UE receives this message, it is expected to
quently is discarded by the UE.
respond with a security mode complete message when the
Adversary assumptions. For successfully carrying out this received message satisfies the MAC validation. In case of
attack, the adversary is required to set up a malicious UE MAC failure, the UE responds with a security mode reject
and also is required to the know the victim UE’s IMSI. message. The MME can also send a security mode command

7
Affected Assumption Standard/ New Vali- Setup
ID Attack name proce- Adversary assumptions validation Stakeholder attack? Detection process Notable implications dated cost
dure slip-up
Authentication Known IMSI, malicious IMSI [13], Denial-of-attach or Denial-of- $2600 (2
A-1 sync. failure Attach UE Section V-A1
3GPP Yes LTEInspector
services. USRPs)
Valid security mode Operational
Inspired LTEInspector Coarse-grained location infor- $2600 (2
A-2 Traceability Attach command, malicious Section V-A1 networks,
eNodeB mobile devices by [10] mation leakage. USRPs)
Numb using $1300 (1
A-3 auth reject Attach Malicious eNodeB Section V-A1 3GPP Yes LTEInspector Denial of all cellular services.
USRP)
3GPP, Reading incoming/outgoing
Authentication Known IMSI, malicious IMSI [13]; operational LTEInspector, messages of victim, stealthy $3900 (3
A-4 relay Attach Yes
eNodeB Section V-A1 networks attack chaining denial of all/selective services, USRPs)
location history poisoning.
Intuition from
Paging chan- Known IMSI, malicious IMSI [13], Stealthy denial of incoming $1300 (1
P-1 nel hijacking Paging eNodeB Section V-A1 3GPP Yes LTEInspector, services. USRP)
domain Knowledge
Stealthy Known IMSI, malicious IMSI [13], Consequence of P-1, Detaching a victim from the $1300 (1
P-2 kicking-off Paging eNodeB Section V-A1 3GPP Yes domain knowledge network surreptitiously. USRP)
Life threatening impact against
Consequence of P-1, mass people, e.g., artificial $1300 (1
P-3 Panic Paging Malicious eNodeB Section V-A1 3GPP Yes domain knowledge USRP)
chaos for terrorist activity.
Energy deple- Paging Known IMSI, GUTI, IMSI
GUTI
[13];
[8], 3GPP
Inspired Consequence of P-1,
by [36], Battery depletion. $1300 (1
P-4 tion malicious eNodeB domain knowledge USRP)
Section V-A1 [37]
3GPP,
Known IMSI or old Section V-A1 enhanced Coarse-grained location infor- $1300 (1
P-5 Linkability Paging
pseudo-IMSI
Yes ProVerif only
mation leakage USRP)
AKA [16]
Detach/ Malicious eNodeB, IMSI [13]; Inspired LTEInspector, Denial of services/Downgrade $1300 (1
D-1 Downgrade Detach known IMSI (for 3GPP attack chaining (for
Section V-A1 by [13] to 2G/3G. USRP)
targeted version) targeted version)
Table III: Summary of our findings ( =validated, =partially validated, =not validated) of the reported attacks.
D. Attack Chaining will forward the c to the eNodeBadv which the eNodeBadv
will send to the UEvic . After the UEvic receives c, unaware
We now demonstrate the application of the attack chaining that the eNodeBadv sent it, it will solve the challenge c to
technique through the authentication relay attack. generate the correct response r. The UEvic will then send r to
A-4 Authentication Relay Attack: In this attack, one the eNodeBadv which it will forward to the UEadv . The UEadv
of our exposed attacks (e.g., paging with IMSI) is stitched then will use r to respond to the MME challenge. Using the
with a relay attack with which an adversary impersonates the same principle, the UEadv will finish the rest of the steps of
victim UE to connect to the EPC without possessing proper the attach procedure.
credentials, and in the process, spoof the victim UE’s location Discussion. Unlike a typical man-in-the-middle attack, the
in the core networks. adversary in this attack can neither decrypt the encrypted traffic
Adversary assumptions. For this attack, the adversary is between the victim UE and the core networks, nor can inject
required to setup a malicious eNodeB (eNodeBadv ) and a valid encrypted traffic unless the service provider blatantly
malicious UE (UEadv ), and also needs to know the IMSI of disregards the standard’s security recommendations and choose
the victim UE. We assume there is a private channel between a weak-/no- security context during connection establishment.
the eNodeBadv and the UEadv . Implications: The implications of this attack include:
Attack description. In this attack, the adversary impersonates (1) Deception: The adversary deceives the victim into be-
an already attached victim UE (UEvic ) to connect to the EPC by lieving that the UEvic is connected to the core network.
collaborating with the eNodeBadv and the UEadv . Suppose the (2) Location History Poisoning: Since the UEadv does not
UEvic is already attached with the legitimate eNodeB denoted need to be in the same tracking area as the UEvic , it can
by eNodeBbenign . The attack can be broken down into two authenticate itself to the EPC from a different tracking area and
main goals: (i) Force UEvic to disconnect from the EPC; (ii) thus provide misleading location information about the UEvic .
UEadv pretends to be UEvic to connect to the EPC. Thus, the UEadv can poison the location history of the UEvic
by performing this attack successively from different tracking
Disconnecting UEvic from the EPC: For disconnecting the
areas. As a result, a fugitive or criminal hiding in one location
UEvic from the EPC, we use our paging with IMSI attack. This
can deceive the core network into believing that the criminal
can also be achieved with our network initiated detach request
has attached to the core network from a different location.
or auth reject attacks.
(3) Loss of confidentiality: The security mode command
UEadv connecting to the EPC by impersonating as UEvic : message sent by the MME during the attach procedure in-
As the UEvic detached itself from the EPC due to a paging with cludes the selected cipher (EEA0-EEA7) and integrity protec-
IMSI message, it will try attach to the eNodeB with the highest tion (EIA0-EIA7) algorithms of the MME. By observing the
signal strength; which is the eNodeBadv . The UEvic will send security mode command messages of all four major network
an attach request message mreq to the eNodeBadv which the providers in the US, we have observed that at least one
eNodeBadv forwards to the UEadv . The UEadv then sends the carrier (OP-I) never used encryption (i.e., uses EEA0—no
same attach request mreq to the eNodeBbenign . The legitimate cipher). Note that, to keep the four major US network oper-
MME will send an authentication challenge c to the UEadv ators anonymous, we use pseudonyms (i.e., OP-I, OP-II, OP-
through the eNodeBbenign upon receipt of mreq . The UEadv III, OP-IV) to identify them. We have observed this insecure

10
Dete- a custom-built LTE network and commercial networks with a
# Prior attack How/Why?
cted
logical Faraday cage [13].
1 Downgrade using tau reject [13] Yes LTEInspector.
2 Denial of all services [13] Yes LTEInspector.
Do not model A. Testbed Setup and Assumption Validation
3 Denial of selected services [13] No data for
attach request. We now describe our testbed setup for attack validation.
Location tracking through mapping Do not model mul-
4 user’s phone number/social network ID No tiple instance of 1) Malicious eNodeB Setup: We have used a Universal
to GUTI [8], [13]. UEs.
5 IMSI catching [16] Yes LTEInspector.
Software-defined Radio Peripheral device (i.e., USRP B210
Do not model RRC [39]) connected to an Intel Core i7 machine running Ubuntu
6 Fine-grained location exposure [13] No 14.04 as the hardware component and OpenLTE [40], an
layer messages.
7
DoS exploiting race condition with
Yes LTEInspector. open source LTE protocol stack implementation, to set up a
paging response [38] in 2G malicious eNodeB which costs around $1300 for the dedicated
Service hijacking exploiting race condi-
8 tion with paging response [38] in 2G Yes LTEInspector. hardware (i.e., excluding the core i7 machine). We used
Linkability using TMSI reallocation OpenLTE’s LTE_Fdd_enodeb application which simultane-
9 Yes LTEInspector.
command [11] in 3G ously acts as a bare-minimal eNodeB, a mobility management
Linkability of IMSI to GUTI using entity (MME), and a home subscriber server (HSS). We have
10 paging request [10] in 3G Yes LTEInspector.
Linkability using
implemented support for the detach procedure in OpenLTE as
11 auth sync failure [10] in 3G Yes LTEInspector. it originally had support for the attach procedure only. We
12 Man-in-the-Middle in 2G [9] Yes LTEInspector. have also instrumented OpenLTE to inject different fabricated
13 Man-in-the-Middle in 3G [12] No Do not model data. messages (e.g., network initiated detach request message)
Table IV: Prior attacks (related to attach, detach, and paging when necessary. For validating attacks against the paging
procedures) that are detected/not detected by LTEInspector. procedure, we use srsLTE [41] which we enhanced to support
eNodeB-initiated paging messages; its original support only
practice multiple times in two different geographical locations. included MME-initiated paging messages.
The adversary hence can learn the UEvic ’s conversation, SMSs,
eNodeB configuration. Our malicious eNodeB can imper-
and data through the UEadv and the eNodeBadv . We reported
sonate the legitimate eNodeB of a network operator (i.e.,
this to the affected carrier which has now been addressed.
OP-I to OP-IV) by broadcasting system info block messages
(4) Complete or Selective DoS: Using this attack, the with higher signal power. For successful impersonation, these
UEadv and the eNodeBadv can relay the incoming/outgoing messages must include parameter values that are equal to
traffic of the UEvic and the EPC. Therefore, the UEadv and that of an operator’s legitimate eNodeB. The adversary uses
the eNodeBadv can deny the UEvic ’s phone-calls/SMS/data- a UE with the operator’s SIM to learn the parameters in
transfers completely/selectively. Consequently, the operational the system info block messages sent by the operator’s eN-
network is deprived of the charges for the incoming/outgoing odeB. In our setup, we use both our custom-built sniffer
calls and SMSs. and QXDM [42] to sniff the incoming and outgoing LTE
(5) Profiling victim’s service usage: Since all the incom- messages on a consumer UE to learn the operator’s parameters.
ing/outgoing communications of the UEvic take place through Table V shows the parameters that we capture from the
the UEadv and the eNodeBadv , the adversary can profile the operator eNodeB’s system info block messages. We use them
service usage pattern (i.e., patterns of phone calls, SMSs, data) to configure the malicious eNodeB with OpenLTE.
of the victim.
Parameters Description
E. Prior Attacks Detected by LTEInspector band The frequency band number of the network operator.
dl earfcn E-UTRA absolute radio frequency channel number.
In addition to the new attacks, LTEInspector is capable mcc Mobile country code specific to a country.
mnc Mobile network code specific to a network operator.
of detecting 9 [16], [13], [38], [10], [11], [9] out of 13 prior p0 nominal pucch Power control parameter.
attacks (see Table IV) that are relevant in the context of attach, p0 nominal pusch Power control parameter.
detach, and paging procedures. The previous attacks [13], q rx lev min Used for cell re-selection.
[8], [12] that LTEInspector cannot detect exploit one of the q hyst Used for cell re-selection
DRX cycle Paging cycle
following which LTEInspector currently does not support: (1)
message data, (2) multiple instances of UEs or MMEs, (3) Table V: Configuration parameters captured from Operator’s
other layers’ (e.g., RRC layer) messages, (4) 2G/3G procedures system info block messages.
that are different from 4G LTE, (5) properties about sets Learning IMSI/IMEI. As soon as the victim UE is forced
of traces, and (6) performance related parameters (e.g., data to connect with the malicious eNodeB, the malicious eNodeB
transmission and reception rate). sends an identity request (IMSI/IMEI) message to the vic-
tim UE which responds with the identity response message
V. VALIDATION OF ATTACKS WITH T ESTBED including its IMSI/IMEI.
In this section, we describe the verification of the new Learning GUTI. We use the well-known set intersection
attacks (along with their adversarial assumptions) detected by technique to find the GUTI as described in [8].
LTEInspector. We have tried to exercise restraint—conforming
to best practices—in validating the effectiveness of the dif- 2) Malicious UE Setup: We use a USRP B210 [39] running
ferent vulnerabilities while maintaining the validation process srsUE [43] (open source protocol stack implementation for
meaningful. To limit the impact of our attacks, we use both UE) as the malicious UE which costs around $1300.

11
Detach Type Our observation of victim UE’s response
attack ∼ 8 times to that of the benign condition. The attacker
Re-attach re- No cellular signals (shows “No Service”). Requires mobile can make it worse, in case it chooses to inject the paging with
quired restart or SIM re-insert to get the 4G LTE back again.
Re-attach not Detaches from 4G LTE. Immediately downgrades to GUTI in every paging occasion.
required 3G/2G and sends attach request to the 3G/2G network.
IMSI detach Does not detach from the 4G LTE network. VI. R ELATED W ORK
Table VI: Victim UE’s responses to different types of detach. In this section, we present existing efforts that focus on
the security, privacy, and availability of cellular networks. In
paging cycle/occasions. To this end, we captured and decoded this context, although prior work has extensively investigated
the system info block and attach request messages—sent in the security and privacy issues of 2G and 3G protocols [8],
plaintext by the carrier’s eNodeB and the victim UE, respec- [6], [7], [49], [50], there is less work that addresses the same
tively, and learned the parameters relevant for computing the concerns for the 4G LTE networks [13].
victim UE’s paging occasion (e.g., DRX cycle, IMSI). The
malicious eNodeB then injected fake paging messages (with The closest to LTEInspector’s approach is by Tu et al. [17]
no paging records) at the paging occasions of the victim UE. where they focus on identifying non-trivial interactions—using
We observed that the victim UE only received the fake paging an explicit-state model checker [23]—between the different
messages instead of the legitimate messages. control-plane protocol layers of LTE. Unlike LTEInspector,
their work, however, can neither explicitly reason about ad-
After hijacking the victim UE’s paging channel, we allowed versarial actions nor can support cryptographic constructs.
two senders to place phone calls and send SMSs to victim’s
phone number triggering the (benign) MME to send multiple Man-in-the-Middle Attacks: Meyer et al. [12] exploit the null
paging messages to the victim UE. We observed that the victim integrity of the security mode command message in 3G net-
did not receive any of the legitimate paging messages, i.e., the works to perform a man-in-the-middle attack. In contrast, our
service notifications. The victim’s unresponsiveness was also authentication relay attack in 4G LTE allows the adversary to
noticed on the sender-side. connect to the EPC without nullifying the security capabilities.
In this attack the adversary, however, cannot decrypt or inject
P-2 Stealthy Kicking-off Attack: For this attack, instead valid encrypted messages unless the operator uses a weak or no
of injecting empty paging messages, the malicious eNodeB security context. Rupprecht et al. [44] used an implementation
fabricated the paging messages with a paging record contain- bug in a particular LTE dongle (Huawei E3276 USB Dongle)
ing the victim UE’s IMSI. As soon as the victim UE received to demonstrate a man-in-the-middle attack for 4G LTE.
this message, we observed that it locally detached itself from
the network and sent an attach request, confirming the attack. IMSI Catching Attacks and 5G AKA Solutions: The IMSI
catching attacks [51], [5], [52] still prevail for 4G LTE
P-3 Panic Attack: To inject fake paging messages to networks as they did for 2G and 3G networks. Arapinis et
arbitrary neighboring UEs, the malicious eNodeB broadcasted al. [10] propose to use public key encryption mechanism for
paging messages at all possible paging occasions. Each of protecting against the IMSI exposure attacks. However, public
these paging messages had the ETWS (earthquake and tsunami key encryption of the IMSI will likely incur high overhead
warning system) bits set to provide the UEs an alert noti- during the attach procedure. Also, this mechanism will require
fication. Upon receiving such alert notification, a UE looks managing multiple public keys for different MMEs (i.e., the
for the actual warning message which the eNodeB broadcasts serving network) in the SIM, as well as modification of the
through the system information block type 10 or 11 or 12 LTE protocol implementation in the legacy UEs. Due to these
messages. Since such warning messages may be received by reasons, the 3GPP community has not yet adopted this solution
other mobile phones which are not subject to our experiment, for real deployments. Broek et al. [16] and Khan et al. [53]
we refrained the malicious eNodeB from sending the actual both proposed changing pseudonym-based (PMSI) defense
warning messages. against IMSI catching attack which have several limitations as
discussed in Section IV. The 5G AKA protocol proposed by
P-4 Energy Depletion Attack: We quantitatively measure
Norman et al.[54] can be viewed as a hybrid of the approaches
the UE’s energy depletion due to this attack. In particular, we
by Arapinis et al. [10] and Broek et al. [16]. In such a protocol,
leverage the strong correlation between energy consumption
the UE encrypts the IMSI using HSS’ public key—unlike the
with message transmission rate [47]. We essentially measured
public-key of MME as in Arapinis et al. [10]—during the very
the message transmission rate in the benign and attack case,
first occurrence of the attach procedure and then subsequently
and drew conclusions about energy consumption. To realize
uses pseudo-IMSIs for communicating with MME. Although
this attack, we configured the malicious eNodeB to broadcast
this approach does not have to manage multiple MME public
paging message with the victim’s GUTI at every third paging
keys, it will likely incur additional overhead due to the use of
occasion (i.e., ∼ 3 seconds) of the victim UE. Upon reception
public key encryption and also suffers from the same weakness
of this paging message, we observed that the victim UE sent
as the solution proposed in [16]. Dabrowski et al. [14] and
an encrypted and integrity protected service request message
Nohl [52] have designed a mobile application that warns the
to the malicious eNodeB. We also carried out this attack where
users about the likely presence of IMSI catchers. In contrast,
the paging message included the victim’s IMSI in which case,
LTEInspector can identify the IMSI catching attack and other
however, the victim initiated the attach procedure. For the
attacks that the adversary may launch after knowing the IMSIs.
paging with GUTI, we carried out the attack for an hour and
observed that the victim sent 1200 service request messages. Linkability Attacks: Arapinis et al. [10] exploit the paging
In the benign case (measured from 4G LTE traces [48]), messages with GUTI for linking the IMSI to the GUTI in 3G
however, on average the UE responds to 156 (std. dev. 14.27) protocols. In contrast, using paging message with IMSI in 4G
paging messages . Roughly, the energy depletion due to this LTE we demonstrate how an adversary along with other attacks

13
(discussed in Section IV-B) can link the IMSIs in 3GPP [35] currently manual and the extracted FSMs are not complete. In
and the old PMSI with the new PMSI in the enhanced the same vein, the list of properties we have checked is not
Authentication and Key Agreement (AKA) mechanism [16]. exhaustive. Our current model also does not capture all the
data embedded in the messages.
Traceability Attacks: Arapinis et al. [11] presented a trace-
ability attack by exploiting an implementation bug in the 3G Threat to Validity. Our manually extracted FSMs from the
network which violates the 3GPP standard recommendation of 3GPP standard may not reflect the behavior of real operational
adopting new temporary identity for the UE with a tracking networks. Inaccuracies in the FSMs may induce false positives,
area change. In another work, Arapinis et al. [10] demonstrate although, we have not observed any. Due to ethical considera-
another traceability attack in which the adversary replays the tions, we limit our experiments to a custom-built network for
auth request for the victim UE to all the UEs in an area and some attack validations which may not faithfully capture the
detects the presence of the victim UE from the causes (MAC operational network behavior.
failure or SQN synchronization failure). In contrast, our
traceability attack with the security mode command procedure VIII. C ONCLUSION AND F UTURE W ORK
exploits the missing nonces in security mode command, a In this paper, we propose LTEInspector which employs
different implementation bug of the commercial networks. an adversarial model-based testing philosophy for expos-
ing attacks against three critical procedures of 4G LTE.
Denial-of-Service (DoS) Attacks: Shaik et al. [13] demonstrate LTEInspector harnesses the strengths of both a symbolic model
3 DoS attacks against UEs in which downgrading to 3G/2G checkers and a protocol verifier and is demonstrated to be
and denial of all network services are performed with the same effective in finding 10 novel and 9 prior attacks. We have also
tracking area update reject message with just two different validated most of our attacks (i.e., 8 out of 10) in a testbed.
causes. In contrast, our DoS attacks use four new techniques
as discussed in Section IV. As opposed to the DoS attacks Future work. In future, we would like to explore the
against the UE, Jover et al. [15] discuss a DoS attack against following four directions: (i) supporting analysis of other pro-
the EPC using a compromised UE/eNodeB that sends huge cedures and protocol layers (e.g., RRC and PDCP) messages;
number of attach request messages to the EPC and thus takes (ii) automating some of the manual tasks in LTEInspector; (iii)
the EPC down. Jermyn et al. [55] show a similar DoS attack enriching the model features and analysis of LTEInspector to
and simulate a set of compromised UEs that exhaust the victim handle message data; (iv) investigating the defense techniques.
UEs’ traffic capacity. Golde et al. [38] exploit a race condition
in the paging message responses in 2G networks that enables a ACKNOWLEDGEMENT
malicious UE to send the paging response message before the We thank our Shepherd, Yongdae Kim, and the anony-
victim UE, and thus preventing the victim UE from receiving mous reviewers for their valuable suggestions. This work
incoming phone calls/SMS. was supported by Intel/CERIAS RAship, FFTF fellowship
by Schlumberger Foundation, NSF grant CNS-1657124, NSF
VII. D ISCUSSION grant CNS-1719369, and Intel as part of the NSF/Intel ICN-
Properties amenable to our analysis. LTEInspector can WEN program.
reason about temporal trace properties (with cryptographic
constructs) of both safety and liveness variations. Our current R EFERENCES
model cannot handle properties that require reasoning about [1] Hackers Are Tapping Into Mobile Networks’ Backbone, New Re-
sets of traces (e.g., noninterference) instead of a single trace. search Shows, https://www.forbes.com/sites/parmyolson/2015/10/14/
hackers-mobile-network-backbone-ss7.
For such properties, we mainly rely on the protocol verifier.
[2] Hackers Take Down the Most Wired Country in Europe, https://www.
Defenses. We deliberately do not discuss defenses for the wired.com/2007/08/ff-estonia/.
observed attacks as retrospectively adding security into an [3] 3GPP Standard, www.3gpp.org.
existing protocol without breaking backward compatibility [4] 3GPP Standard. Release 12., http://www.3gpp.org/specifications/
often yields band-aid-like-solutions which do not hold up releases/68-release-12.
under extreme scrutiny. It is also not clear, especially, for the [5] D. Abodunrin, Y. Miche, and S. Holtmanns, “Some dangers from 2g
networks legacy support and a possible mitigation,” in Communications
authentication relay attack whether a defense exists that does and Network Security (CNS), Sept 2015, pp. 585–593.
not require major infrastructural or protocol overhaul. A pos- [6] P. P. C. Lee, T. Bu, and T. Woo, “On the detection of signaling dos
sibility is to employ a distance-bounding protocol; realization attacks on 3g wireless networks,” in 26th International Conference on
of such protocol is, however, rare in practice [56]. Due to the Computer Communications (INFOCOM), May 2007, pp. 1289–1297.
strict performance requirements of 4G LTE, any public-key [7] N. Golde, K. Redon, and R. Borgaonkar, “Weaponizing Femtocells:
cryptography-based solution is unlikely to be feasible. On the The Effect of Rogue Devices on Mobile Telecommunications,” in
contrary, symmetric-key cryptography often have scalability Proceedings of the 19th Annual Network & Distributed System Security
Symposium, Feb. 2012.
issues due to establishing a common shared key for broadcast-
[8] D. F. Kune, J. Koelndorfer, and Y. Kim, “Location leaks on the gsm
ing sensitive (e.g., paging) messages. Further investigation on air interface,” in NDSS, 2012.
defenses is, therefore, required for balancing the performance
[9] I. Androulidakis, “Intercepting mobile phone calls and short messages
and scalability as well as guaranteeing the security. using a gsm tester,” in 18th Conference on Computer Networks, Ustron,
Poland, A. Kwiecień, P. Gaj, and P. Stera, Eds., 2011, pp. 281–288.
Limitations. Although LTEInspector suggests a systematic ap-
[10] M. Arapinis, L. Mancini, E. Ritter, M. Ryan, N. Golde, K. Redon,
proach, it currently requires human intervention, for instance, and R. Borgaonkar, “New privacy issues in mobile telephony: Fix and
deciding which sub-steps of the counterexample is required to verification,” in Proceedings of the 2012 ACM Conference on Computer
be modeled in ProVerif and how. Also, our FSM extraction is and Communications Security, ser. CCS ’12. ACM, 2012, pp. 205–216.

14
[11] M. Arapinis, L. I. Mancini, E. Ritter, and M. Ryan, “Privacy through [32] B. Blanchet, “Automatic verification of correspondences for security
pseudonymity in mobile telephony systems,” in NDSS, 2014. protocols,” Journal of Computer Security, vol. 17, no. 4, pp. 363–434,
[12] U. Meyer and S. Wetzel, “A man-in-the-middle attack on umts,” in Jul. 2009.
Proceedings of the 3rd ACM Workshop on Wireless Security, ser. WiSe [33] M. Abadi and B. Blanchet, “Analyzing Security Protocols with Secrecy
’04. ACM, 2004, pp. 90–97. Types and Logic Programs,” in 29th Annual ACM SIGPLAN - SIGACT
Symposium on Principles of Programming Languages (POPL 2002).
[13] A. Shaik, J. Seifert, R. Borgaonkar, N. Asokan, and V. Niemi, “Practical
Portland, Oregon: ACM Press, Jan. 2002, pp. 33–44.
attacks against privacy and availability in 4g/lte mobile communication
systems,” in 23nd Annual Network and Distributed System Security [34] E. A. Emerson and K. S. Namjoshi, “Reasoning about rings,” in Pro-
Symposium, NDSS, San Diego, CA, USA, February 21-24, 2016. ceedings of the 22Nd ACM SIGPLAN-SIGACT Symposium on Principles
of Programming Languages (POPL). ACM, 1995, pp. 85–94.
[14] A. Dabrowski, N. Pianta, T. Klepp, M. Mulazzani, and E. Weippl, “Imsi-
catch me if you can: Imsi-catcher-catchers,” in Proceedings of the 30th [35] 3GPP. Non-Access-Stratum (NAS) protocol for Evolved Packet System
Annual Computer Security Applications Conference, ser. ACSAC ’14. (EPS); Stage 3 Specification 3GPP TS 24.301 version 12.8.0 Release
ACM, 2014, pp. 246–255. 12., [Online]. Available: http://www.3gpp.org/dynareport/24301.htm.
[15] R. P. Jover, “Security attacks against the availability of lte mobility [36] R. Racic, D. Ma, and H. Chen, “Exploiting mms vulnerabilities to
networks: Overview and research directions,” in Wireless Personal Mul- stealthily exhaust mobile phone’s battery,” in Securecomm and Work-
timedia Communications (WPMC), 2013 16th International Symposium shops, Aug 2006, pp. 1–10.
on, June 2013, pp. 1–9. [37] J. Serror, H. Zang, and J. C. Bolot, “Impact of paging channel overloads
or attacks on a cellular network,” in Proceedings of the 5th ACM
[16] F. van den Broek, R. Verdult, and J. de Ruiter, “Defeating imsi catchers,”
Workshop on Wireless Security, 2006, pp. 75–84.
in Proceedings of the 22Nd ACM SIGSAC Conference on Computer and
Communications Security, ser. CCS ’15. ACM, 2015, pp. 340–351. [38] N. Golde, K. Redon, and J.-P. Seifert, “Let me answer that for you:
Exploiting broadcast information in cellular networks,” in Proceedings
[17] G.-H. Tu, Y. Li, C. Peng, C.-Y. Li, H. Wang, and S. Lu, “Control-plane of the 22Nd USENIX Conference on Security, 2013, pp. 33–48.
protocol interactions in cellular networks,” in Proceedings of the 2014
ACM Conference on SIGCOMM. ACM, 2014, pp. 223–234. [39] USRP B210, https://www.ettus.com/product/details/UB210-KIT.
[18] Cellular Service, https://www.fcc.gov/wireless/bureau-divisions/ [40] OpenLTE, http://openlte.sourceforge.net/.
mobility-division/cellular-service. [41] srsLTE, https://github.com/srsLTE.
[19] D. Dolev and A. C. Yao, “On the security of public [42] Qxdm Professional Qualcomm Extensible Diagnostic-
key protocols,” Stanford, CA, USA, Tech. Rep., 1981, Monitor, www.qualcomm.com/media/documents/files/
http://www.ncstrl.org:8900/ncstrl/servlet/search?formname=detail&id=oai qxdm-professional-qualcomm-extensible-diagnostic-monitor.pdf.
[20] K. R. Apt and D. C. Kozen, “Limits for automatic verification of finite- [43] srsUE, https://github.com/srsLTE/srsUE.
state concurrent systems,” Inf. Process. Lett., vol. 22, no. 6, pp. 307–309, [44] D. Rupprecht, K. Jansen, and C. Pöpper, “Putting lte security functions
May 1986. to the test: A framework to evaluate implementation correctness,” in
Proceedings of the 10th USENIX Conference on Offensive Technologies,
[21] Z. Manna and A. Pnueli, “A hierarchy of temporal properties (invited
paper, 1989),” in Proceedings of the ninth annual ACM symposium on ser. WOOT’16, 2016, pp. 40–51.
Principles of distributed computing. ACM, 1990, pp. 377–410. [45] N. Bui and J. Widmer, “Owl: A reliable online watcher for lte control
channel measurements,” in Proceedings of the 5th Workshop on All
[22] A. Cimatti, E. M. Clarke, F. Giunchiglia, and M. Roveri, “Nusmv: A
Things Cellular: Operations, Applications and Challenges, ser. ATC
new symbolic model verifier,” in Proceedings of the 11th International
’16. ACM, 2016, pp. 25–30.
Conference on Computer Aided Verification, ser. CAV ’99. London,
UK, UK: Springer-Verlag, 1999, pp. 495–499. [46] OpenEPC, www.openepc.com.
[23] G. Holzmann, Spin Model Checker, the: Primer and Reference Manual, [47] P. Y. Kong, “Power consumption and packet delay relationship for het-
1st ed. Addison-Wesley Professional, 2003. erogeneous wireless networks,” IEEE Communications Letters, vol. 17,
no. 7, pp. 1376–1379, July 2013.
[24] B. Blanchet, “Modeling and verifying security protocols with the
[48] Y. Li, C. Peng, Z. Yuan, J. Li, H. Deng, and T. Wang, “Mobileinsight:
applied pi calculus and proverif,” Foundations and Trends in Privacy
Extracting and analyzing cellular network information on smartphones,”
and Security, vol. 1, no. 1-2, pp. 1–135, 2016.
in Proceedings of the 22nd Annual International Conference on Mobile
[25] S. Meier, B. Schmidt, C. Cremers, and D. Basin, “The tamarin prover Computing and Networking, ser. MobiCom ’16, 2016, pp. 202–215.
for the symbolic analysis of security protocols,” in Proceedings of the [49] P. Traynor, P. McDaniel, and T. La Porta, “On attack causality in
25th International Conference on Computer Aided Verification (CAV). internet-connected cellular networks,” in Proceedings of 16th USENIX
Springer-Verlag, 2013, pp. 696–701. Security Symposium, 2007, pp. 21:1–21:16.
[26] A. Armando and et al., “The avispa tool for the automated validation of [50] P. Traynor, M. Lin, M. Ongtang, V. Rao, T. Jaeger, P. McDaniel, and
internet security protocols and applications,” in Proceedings of the 17th T. La Porta, “On cellular botnets: Measuring the impact of malicious
International Conference on Computer Aided Verification, ser. CAV’05. devices on a cellular network core,” in Proceedings of the 16th ACM
Springer-Verlag, 2005, pp. 281–285. Conference on Computer and Communications Security (CCS), 2009,
[27] J. Bengtson, K. Bhargavan, C. Fournet, A. D. Gordon, and S. Maffeis, pp. 223–234.
“Refinement types for secure implementations,” ACM Trans. Program. [51] R. Borgaonkar and S. Udar, “Understanding imsi privacy,” in BlackHat,
Lang. Syst., vol. 33, no. 2, pp. 8:1–8:45, Feb. 2011. 2014.
[28] G. Lowe, “Breaking and fixing the needham-schroeder public-key pro- [52] K. Nohl, “Mobile self-defense.” [Online]. Avail-
tocol using fdr,” in Proceedings of the Second International Workshop able: https://events.ccc.de/congress/2014/Fahrplan/system/attachments/
on Tools and Algorithms for Construction and Analysis of Systems, ser. 2493/original/Mobile Self Defense-Karsten Nohl-31C3-v1.pdf
TACAs ’96. Springer-Verlag, 1996, pp. 147–166. [53] M. S. A. Khan and C. J. Mitchell, “Trashing imsi catchers in mobile
[29] C. J. Cremers, “Unbounded verification, falsification, and characteriza- networks,” in Proceedings of the 10th ACM Conference on Security and
tion of security protocols by pattern refinement,” in Proceedings of the Privacy in Wireless and Mobile Networks, 2017, pp. 207–218.
15th ACM Conference on Computer and Communications Security, ser. [54] Protecting IMSI and User Privacy in 5G Networks, www.ericsson.com/
CCS ’08. ACM, 2008, pp. 119–128. res/docs/2016/protecting-imsi-and-user-privacy-in-5g-networks.pdf.
[30] A. C. Yao, “Theory and application of trapdoor functions,” in Pro- [55] J. Jermyn, G. Salles-Loustau, and S. Zonouz, “An analysis of dos attack
ceedings of the 23rd Annual Symposium on Foundations of Computer strategies against the lte ran,” vol. 3, 2014, pp. 159–180.
Science, ser. SFCS ’82. IEEE Computer Society, 1982, pp. 80–91.
[56] K. B. Rasmussen and S. Čapkun, “Realization of rf distance bounding,”
[31] J.-K. Tsay and S. F. Mjølsnes, “A vulnerability in the umts and lte in Proceedings of the 19th USENIX Conference on Security, ser.
authentication and key agreement protocols,” in Proceedings of the 6th USENIX Security’10, 2010, pp. 25–25.
MMM-ACNS. Springer-Verlag, 2012, pp. 65–76.

15

You might also like