Side Channel Attacks in 4G and 5G Cellular Networks
This talk first presents how the fixed nature of paging occasions can be exploited as a side-channel by an adversary in the vicinity of a victim to associate the victim's soft-identity (e.g., phone number, Twitter handle) with its paging occasion, with only a modest cost, through an attack dubbed ToRPEDO (TRacking via Paging mEssage DistributiOn). Consequently, we demonstrate how ToRPEDO can enable an adversary to verify a victim's coarse-grained location information, inject fabricated paging messages, and mount denial-of-service attacks.
By Syed Hussain
Full Abstract & Presentation Materials: https://www.blackhat.com/eu-19/briefings/schedule/#side-channel-attacks-in-g-and-g-cellular-networks-17849
Видео Side Channel Attacks in 4G and 5G Cellular Networks канала Black Hat
By Syed Hussain
Full Abstract & Presentation Materials: https://www.blackhat.com/eu-19/briefings/schedule/#side-channel-attacks-in-g-and-g-cellular-networks-17849
Видео Side Channel Attacks in 4G and 5G Cellular Networks канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Side-Channel Analysis Demo: FPGA BoardHow Cellular 4G/5G Networks Work - Wireless Networks | Computer Networks Ep. 7.4 | Kurose & Ross5G C-V2X Technology Evolution SimulationHow does your mobile phone work? | ICT #1Samy Kamkar - FPGA Glitching & Side Channel AttacksBuild Your Own Private 5G Network on Kubernetes - Frank Zdarsky, Red Hat & Raymond Knopp, Eurecom4G to 5G Evolution: In-Depth Security Perspective5G Explained: Synchronization Signal Blocks in 5G NRWhat is 5G? | CNBC ExplainsNew Adventures in Spying 3G and 4G Users: Locate Track & Monitor1.2 - EVOLUTION OF COMMUNICATION - FROM 1G TO 4G & 5G03 - BruCON 0x0B - Security transition from 4G to 5G are we secure enough? - Altaf Shaik and RavishaPractical Side-Channel Attacks Against WPA-TKIPWhat is 1G, 2G, 3G, 4G, 5G of Cellular Mobile Communications - Wireless TelecommunicationsIs 5G Safe?5G IMSI Catchers Mirage5G IMSI Catchers Mirage8 Most Common Cybersecurity Threats | Types of Cyber Attacks | Cybersecurity for Beginners | EdurekaTesting Real 5G: Part 2!RSA Power Analysis Side-Channel Attack - rhme2ONAP Introduction