首页 > 最新文献

Security and Privacy in Mobile Information and Communication Systems最新文献

英文 中文
Attacks Against Security Context in 5G Network 5G网络安全背景下的攻击
Pub Date : 2023-03-20 DOI: 10.48550/arXiv.2303.10955
Zhiwei Cui, Baojiang Cui, Li Su, Haitao Du, Hongxin Wang, Junsong Fu
The security context used in 5G authentication is generated during the Authentication and Key Agreement (AKA) procedure and stored in both the user equipment (UE) and the network sides for the subsequent fast registration procedure. Given its importance, it is imperative to formally analyze the security mechanism of the security context. The security context in the UE can be stored in the Universal Subscriber Identity Module (USIM) card or in the baseband chip. In this work, we present a comprehensive and formal verification of the fast registration procedure based on the security context under the two scenarios in ProVerif. Our analysis identifies two vulnerabilities, including one that has not been reported before. Specifically, the security context stored in the USIM card can be read illegally, and the validity checking mechanism of the security context in the baseband chip can be bypassed. Moreover, these vulnerabilities also apply to 4G networks. As a consequence, an attacker can exploit these vulnerabilities to register to the network with the victim's identity and then launch other attacks, including one-tap authentication bypass leading to privacy disclosure, location spoofing, etc. To ensure that these attacks are indeed realizable in practice, we have responsibly confirmed them through experimentation in three operators. Our analysis reveals that these vulnerabilities stem from design flaws of the standard and unsafe practices by operators. We finally propose several potential countermeasures to prevent these attacks. We have reported our findings to the GSMA and received a coordinated vulnerability disclosure (CVD) number CVD-2022-0057.
5G身份验证中使用的安全上下文在身份验证和密钥协议(AKA)过程中生成,并存储在用户设备(UE)和网络侧,以供随后的快速注册过程使用。鉴于其重要性,对安全上下文的安全机制进行形式化分析势在必行。终端中的安全上下文可以存储在通用用户身份模块(USIM)卡或基带芯片中。在这项工作中,我们根据ProVerif中两种场景下的安全上下文,对快速注册过程进行了全面和正式的验证。我们的分析确定了两个漏洞,其中一个以前没有报道过。具体来说,存储在USIM卡中的安全上下文可以被非法读取,并且可以绕过基带芯片中安全上下文的有效性检查机制。此外,这些漏洞也适用于4G网络。因此,攻击者可以利用这些漏洞以受害者的身份注册到网络,然后发动其他攻击,包括一键式身份验证绕过导致隐私泄露,位置欺骗等。为了确保这些攻击在实践中确实可以实现,我们通过对三个运营商的实验负责任地证实了它们。我们的分析表明,这些漏洞源于标准的设计缺陷和运营商的不安全操作。最后,我们提出了几个潜在的对策来防止这些攻击。我们已经向GSMA报告了我们的发现,并收到了协调漏洞披露(CVD)编号cdd -2022-0057。
{"title":"Attacks Against Security Context in 5G Network","authors":"Zhiwei Cui, Baojiang Cui, Li Su, Haitao Du, Hongxin Wang, Junsong Fu","doi":"10.48550/arXiv.2303.10955","DOIUrl":"https://doi.org/10.48550/arXiv.2303.10955","url":null,"abstract":"The security context used in 5G authentication is generated during the Authentication and Key Agreement (AKA) procedure and stored in both the user equipment (UE) and the network sides for the subsequent fast registration procedure. Given its importance, it is imperative to formally analyze the security mechanism of the security context. The security context in the UE can be stored in the Universal Subscriber Identity Module (USIM) card or in the baseband chip. In this work, we present a comprehensive and formal verification of the fast registration procedure based on the security context under the two scenarios in ProVerif. Our analysis identifies two vulnerabilities, including one that has not been reported before. Specifically, the security context stored in the USIM card can be read illegally, and the validity checking mechanism of the security context in the baseband chip can be bypassed. Moreover, these vulnerabilities also apply to 4G networks. As a consequence, an attacker can exploit these vulnerabilities to register to the network with the victim's identity and then launch other attacks, including one-tap authentication bypass leading to privacy disclosure, location spoofing, etc. To ensure that these attacks are indeed realizable in practice, we have responsibly confirmed them through experimentation in three operators. Our analysis reveals that these vulnerabilities stem from design flaws of the standard and unsafe practices by operators. We finally propose several potential countermeasures to prevent these attacks. We have reported our findings to the GSMA and received a coordinated vulnerability disclosure (CVD) number CVD-2022-0057.","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attack Detection in Mobile Internet and Networks Using the Graph-Based Schemes for Combining the Support Vector Machines 基于图和支持向量机的移动互联网和网络攻击检测
Pub Date : 2017-10-19 DOI: 10.1007/978-981-13-3732-1_1
A. Branitskiy, Igor Kotenko
{"title":"Attack Detection in Mobile Internet and Networks Using the Graph-Based Schemes for Combining the Support Vector Machines","authors":"A. Branitskiy, Igor Kotenko","doi":"10.1007/978-981-13-3732-1_1","DOIUrl":"https://doi.org/10.1007/978-981-13-3732-1_1","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121121387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Frame-Based Approach to Generating Insider Threat Test Suite on Cloud File-Sharing 基于框架的云文件共享内部威胁测试套件生成方法
Pub Date : 2017-10-19 DOI: 10.1007/978-981-13-3732-1_12
Tsung-Ju Lee, S. Tseng, Hsing-Chung Chen, Sung-Chiang Lin, Chiun-How Kao
{"title":"A Frame-Based Approach to Generating Insider Threat Test Suite on Cloud File-Sharing","authors":"Tsung-Ju Lee, S. Tseng, Hsing-Chung Chen, Sung-Chiang Lin, Chiun-How Kao","doi":"10.1007/978-981-13-3732-1_12","DOIUrl":"https://doi.org/10.1007/978-981-13-3732-1_12","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126840645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAAS: A Secure Anonymous Authentication Scheme for PMIPv6 SAAS: PMIPv6安全匿名认证方案
Pub Date : 2017-10-19 DOI: 10.1007/978-981-13-3732-1_3
Tianhan Gao, Xinyang Deng, Fanghua Geng
{"title":"SAAS: A Secure Anonymous Authentication Scheme for PMIPv6","authors":"Tianhan Gao, Xinyang Deng, Fanghua Geng","doi":"10.1007/978-981-13-3732-1_3","DOIUrl":"https://doi.org/10.1007/978-981-13-3732-1_3","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131208589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Facebook Place Information Extraction Strategy 一个有效的Facebook地点信息提取策略
Pub Date : 2017-10-19 DOI: 10.1007/978-981-13-3732-1_10
Jong-Shin Chen, Chuan-Bi Lin, Cheng-Ying Yang, Yung-Fa Huang
{"title":"An Efficient Facebook Place Information Extraction Strategy","authors":"Jong-Shin Chen, Chuan-Bi Lin, Cheng-Ying Yang, Yung-Fa Huang","doi":"10.1007/978-981-13-3732-1_10","DOIUrl":"https://doi.org/10.1007/978-981-13-3732-1_10","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121338253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generating Dynamic Box by Using an Input String 使用输入字符串生成动态框
Pub Date : 2017-10-19 DOI: 10.1007/978-981-13-3732-1_2
Jia-Jia Liu, Yi-Li Huang, Fang-Yie Leu, Xing-You Pan, Li-Ren Chen
{"title":"Generating Dynamic Box by Using an Input String","authors":"Jia-Jia Liu, Yi-Li Huang, Fang-Yie Leu, Xing-You Pan, Li-Ren Chen","doi":"10.1007/978-981-13-3732-1_2","DOIUrl":"https://doi.org/10.1007/978-981-13-3732-1_2","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129331003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance of Sub-optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction 次优搜索算法在PTS相位选择中的性能
Pub Date : 2017-10-19 DOI: 10.1007/978-981-13-3732-1_11
J. Wen, Fang-Yu Chang, Yung-Fa Huang, Hsing-Chung Chen, Zonyin Shae
{"title":"Performance of Sub-optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction","authors":"J. Wen, Fang-Yu Chang, Yung-Fa Huang, Hsing-Chung Chen, Zonyin Shae","doi":"10.1007/978-981-13-3732-1_11","DOIUrl":"https://doi.org/10.1007/978-981-13-3732-1_11","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127618288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning Systems 基于iBeacon技术和最近邻算法的区域定位系统
Pub Date : 2017-10-19 DOI: 10.1007/978-981-13-3732-1_9
Chia-Hsin Cheng, Chia-Yao Hu
{"title":"Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning Systems","authors":"Chia-Hsin Cheng, Chia-Yao Hu","doi":"10.1007/978-981-13-3732-1_9","DOIUrl":"https://doi.org/10.1007/978-981-13-3732-1_9","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131679259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method for Predicting Pixel Values in Background Areas in the Problem of Weighted Steganalysis in the Spatial Domain of Natural Images Under Small Payloads 小载荷下自然图像空间域加权隐写问题中背景区域像素值预测方法
Pub Date : 2017-10-19 DOI: 10.1007/978-981-13-3732-1_5
Daniil A. Bashmakov, A. G. Korobeynikov, A. Sivachev, D. E. Baz, D. Levshun
{"title":"Method for Predicting Pixel Values in Background Areas in the Problem of Weighted Steganalysis in the Spatial Domain of Natural Images Under Small Payloads","authors":"Daniil A. Bashmakov, A. G. Korobeynikov, A. Sivachev, D. E. Baz, D. Levshun","doi":"10.1007/978-981-13-3732-1_5","DOIUrl":"https://doi.org/10.1007/978-981-13-3732-1_5","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128366995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Keystroke Authentication Based on Convolutional Neural Network 基于卷积神经网络的用户击键认证
Pub Date : 2017-10-19 DOI: 10.1007/978-981-13-3732-1_13
Mengxin Liu, Jianfeng Guan
{"title":"User Keystroke Authentication Based on Convolutional Neural Network","authors":"Mengxin Liu, Jianfeng Guan","doi":"10.1007/978-981-13-3732-1_13","DOIUrl":"https://doi.org/10.1007/978-981-13-3732-1_13","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124162480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Security and Privacy in Mobile Information and Communication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1