Breaking LTE on Layer 1, 2, and 3
Title: Breaking LTE on Layer 1, 2, and 3
Speaker: Mattias Huber
This talk will be a general overview of the known attacks on the LTE cellular protocol starting with a general description of how the cellular protocol works followed by discussion of attacks that can be done at layers 1, 2, and 3.
Layer 1: Jamming LTE using a power-limited smart jammer
Layer 2: User redirection by altering the destination IP of DNS requests
Layer 3: Downgrading, denial of service, location tracking, channel hijacking, and sending fake SMS/emergency messages
Lastly there will be a brief discussion about the decreasing price in Software Defined Radios and how this is affecting the security of cellular protocols as the barrier to entry to launch these attacks is dropping rapidly.
Видео Breaking LTE on Layer 1, 2, and 3 канала ShellCon
Speaker: Mattias Huber
This talk will be a general overview of the known attacks on the LTE cellular protocol starting with a general description of how the cellular protocol works followed by discussion of attacks that can be done at layers 1, 2, and 3.
Layer 1: Jamming LTE using a power-limited smart jammer
Layer 2: User redirection by altering the destination IP of DNS requests
Layer 3: Downgrading, denial of service, location tracking, channel hijacking, and sending fake SMS/emergency messages
Lastly there will be a brief discussion about the decreasing price in Software Defined Radios and how this is affecting the security of cellular protocols as the barrier to entry to launch these attacks is dropping rapidly.
Видео Breaking LTE on Layer 1, 2, and 3 канала ShellCon
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
LTE Attach Part 2: Connection IDs in CP and UP8x8 MIMO (LTE Advanced) Achieves up to 1 gigabit per second dataLTE Architecture in easiest way in Hindi | 4G Architecture in hindi | How 4G Works |LTE vs 4GDDoS Attacks as Fast As PossibleDEF CON 18 - Chris Paget - Practical Cellphone SpyingDDoS Attack ExplainedWhat is a VPN? - Gary explainsDefending from DDoS Attacks - CloudflareLTE cell search procedure4G and LTE: Explained!How to Reset a Windows Password Through a BackdoorQRadar Detecting DDoS attacks and Superflows15 Windows Settings You Should Change Now!Google I/O 2013 - Adaptive Streaming for You and YouTubeHow to Access your Router from Outside NetworkHow easy is it to capture data on public free Wi-Fi? - Gary explainsSlow Loris Attack - ComputerphileTypes of DDoS Attacks Explained | Arbor NetworksLTE Documentary Part 1/211 Hidden Chrome Features (You'll Wish You Knew About Sooner)