【24h】

Breaking LTE on Layer Two

机译:在二层上打破LTE

获取原文

摘要

Long Term Evolution (LTE) is the latest mobile communication standard and has a pivotal role in our information society: LTE combines performance goals with modern security mechanisms and serves casual use cases as well as critical infrastructure and public safety communications. Both scenarios are demanding towards a resilient and secure specification and implementation of LTE, as outages and open attack vectors potentially lead to severe risks. Previous work on LTE protocol security identified crucial attack vectors for both the physical (layer one) and network (layer three) layers. Data link layer (layer two) protocols, however, remain a blind spot in existing LTE security research. In this paper, we present a comprehensive layer two security analysis and identify three attack vectors. These attacks impair the confidentiality and/or privacy of LTE communication. More specifically, we first present a passive identity mapping attack that matches volatile radio identities to longer lasting network identities, enabling us to identify users within a cell and serving as a stepping stone for follow-up attacks. Second, we demonstrate how a passive attacker can abuse the resource allocation as a side channel to perform website fingerprinting that enables the attacker to learn the websites a user accessed. Finally, we present the A LTE R attack that exploits the fact that LTE user data is encrypted in counter mode (AES-CTR) but not integrity protected, which allows us to modify the message payload. As a proof-of-concept demonstration, we show how an active attacker can redirect DNS requests and then perform a DNS spoofing attack. As a result, the user is redirected to a malicious website. Our experimental analysis demonstrates the real-world applicability of all three attacks and emphasizes the threat of open attack vectors on LTE layer two protocols.
机译:长期演进(LTE)是最新的移动通信标准,在我们的信息社会中具有重要作用:LTE将性能目标与现代安全机制相结合,并提供休闲用例以及关键的基础设施和公共安全通信。这两种情景都要求有弹性和安全的规范和实现LTE,因为中断和开放攻击向量可能导致严重风险。以前的LTE协议安全性的工作标识了物理(层)和网络(第三层)层的重要攻击向量。然而,数据链路层(第两层)协议仍然是现有LTE安全研究中的盲点。在本文中,我们提出了一层综合的两个安全分析,并确定了三个攻击向量。这些攻击损害了LTE通信的机密性和/或隐私。更具体地,我们首先介绍一种被动标识映射攻击,该映射攻击与持久的网络标识相匹配,使我们能够识别小区内的用户,并用作后续攻击的踏脚石。其次,我们展示了被动攻击者如何将资源分配滥用作为侧视通道,以执行网站指纹,使攻击者能够学习访问的网站。最后,我们介绍了利用LTE用户数据在计数器模式(AES-CTR)中加密但不受限制的事实的LTE R攻击,这允许我们修改消息有效载荷。作为概念验证演示,我们展示了活动攻击者如何重定向DNS请求,然后执行DNS欺骗攻击。结果,用户被重定向到恶意网站。我们的实验分析显示了所有三个攻击的真实适用性,并强调了LTE层的开放攻击向量的威胁。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号