AdaptOver: Adaptive Overshadowing Attacks in Cellular Networks

18Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In cellular networks, attacks on the communication link between a mobile device and the core network significantly impact privacy and availability. Up until now, fake base stations have been required to execute such attacks. Since they require a continuously high output power to attract victims, they are limited in range and can be easily detected both by operators and dedicated apps on users' smartphones. This paper introduces AdaptOver-A MITM attack system designed for cellular networks, specifically for LTE and 5G-NSA. AdaptOver allows an adversary to decode, overshadow (replace) and inject arbitrary messages over the air in either direction between the network and the mobile device. Using overshadowing, AdaptOver can cause a persistent (≥ 12h) DoS or a privacy leak by triggering a UE to transmit its persistent identifier (IMSI) in plain text. These attacks can be launched against all users within a cell or specifically target a victim based on its phone number. We implement AdaptOver using a software-defined radio and a low-cost amplification setup. We demonstrate the effects and practicality of the attacks on a live operational LTE and 5G-NSA network with a wide range of smartphones. Our experiments show that AdaptOver can launch an attack on a victim more than 3.8km away from the attacker. Given its practicability and efficiency, AdaptOver shows that existing countermeasures that are focused on fake base stations are no longer sufficient, marking a paradigm shift for designing security mechanisms in cellular networks.

Cite

CITATION STYLE

APA

Erni, S., Kotuliak, M., Leu, P., Roeschlin, M., & Capkun, S. (2022). AdaptOver: Adaptive Overshadowing Attacks in Cellular Networks. In Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM (pp. 743–755). Association for Computing Machinery. https://doi.org/10.1145/3495243.3560525

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free