【24h】

Breaking LTE on Layer Two

机译:在第二层打破LTE

获取原文

摘要

Long Term Evolution (LTE) is the latest mobile communication standard and has a pivotal role in our information society: LTE combines performance goals with modern security mechanisms and serves casual use cases as well as critical infrastructure and public safety communications. Both scenarios are demanding towards a resilient and secure specification and implementation of LTE, as outages and open attack vectors potentially lead to severe risks. Previous work on LTE protocol security identified crucial attack vectors for both the physical (layer one) and network (layer three) layers. Data link layer (layer two) protocols, however, remain a blind spot in existing LTE security research. In this paper, we present a comprehensive layer two security analysis and identify three attack vectors. These attacks impair the confidentiality and/or privacy of LTE communication. More specifically, we first present a passive identity mapping attack that matches volatile radio identities to longer lasting network identities, enabling us to identify users within a cell and serving as a stepping stone for follow-up attacks. Second, we demonstrate how a passive attacker can abuse the resource allocation as a side channel to perform website fingerprinting that enables the attacker to learn the websites a user accessed. Finally, we present the A LTE R attack that exploits the fact that LTE user data is encrypted in counter mode (AES-CTR) but not integrity protected, which allows us to modify the message payload. As a proof-of-concept demonstration, we show how an active attacker can redirect DNS requests and then perform a DNS spoofing attack. As a result, the user is redirected to a malicious website. Our experimental analysis demonstrates the real-world applicability of all three attacks and emphasizes the threat of open attack vectors on LTE layer two protocols.
机译:长期演进(LTE)是最新的移动通信标准,在我们的信息社会中具有举足轻重的作用:LTE将性能目标与现代安全机制结合在一起,并为临时使用案例以及关键基础设施和公共安全通信提供服务。两种情况都要求实现LTE的弹性和安全性规范和实施,因为中断和开放式攻击媒介可能会导致严重的风险。 LTE协议安全性的先前工作为物理(第一层)和网络(第三层)确定了关键的攻击媒介。但是,数据链路层(第二层)协议仍然是现有LTE安全研究中的盲点。在本文中,我们提出了全面的第二层安全分析,并确定了三种攻击媒介。这些攻击损害了LTE通信的机密性和/或隐私性。更具体地说,我们首先提出一种被动身份映射攻击,该攻击将易失性无线电身份与更持久的网络身份进行匹配,从而使我们能够识别小区内的用户,并充当后续攻击的垫脚石。其次,我们演示了被动攻击者如何滥用资源分配作为辅助渠道来执行网站指纹识别,从而使攻击者能够了解用户访问的网站。最后,我们提出了A LTE R攻击,该攻击利用了以下事实:LTE用户数据以计数器模式(AES-CTR)加密,但没有完整性保护,这使我们能够修改消息有效负载。作为概念验证的演示,我们演示了活动的攻击者如何重定向DNS请求,然后执行DNS欺骗攻击。结果,用户被重定向到恶意网站。我们的实验分析证明了这三种攻击在现实中的适用性,并强调了第二层LTE协议上开放式攻击媒介的威胁。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号