Presented at
Black Hat USA 2021,
Aug. 5, 2021, 10:20 a.m.
(40 minutes).
IMSI catchers aka Stingrays aka fake base stations are well-known privacy threats to almost every mobile phone with SIM card connectivity (including iOS or Android-based) in the world. The cellular network generations such as 2G, 3G, and 4G are vulnerable to such almost undetectable and silent attacks. Finally, new security mechanisms in the next generation 5G networks have been added to address these types of issues.
In this talk, we carefully investigate new security protection techniques in 5G and perform practical experiments using commercial 5G devices. Besides, we explain our failure and successful attempts at building 5G IMSI catchers for our research. Finally, we conclude with results explaining the impact of 5G IMSI catchers against 5G users without downgrading to legacy networks, guidelines for the cellular device vendors, operators, and end-users and directions towards fixing the problem in 6G networks.
Presenters:
-
Ravishankar Borgaonkar
- Senior Research Scientist, SINTEF Digital & University of Stavanger
Ravishankar Borgaonkar works as a senior research scientist at SINTEF Digital and Associate Professor II at the University of Stavanger in Norway. He holds a PhD in telecommunication security area from Technischen Universität Berlin (TU Berlin, 2013). In 2007, he received an Erasmus Mundus award from the European Union and completed a dual master's degree from the Royal Institute of Technology (Sweden) and Aalto University (previously TKK) in 2009. His primary research themes are related to mobile telecommunication networks and security threats for the next generation of digital communication, ranging from 2G/3G/4G/5G network security to end-user device security. At SINTEF currently, he researches on securing critical digital infrastructure (such as smart grid/Maritime/healthcare/public-safety communication) and 5G network-enabled business verticals. He has extensive experience in a cellular network and information security domain at Deutsche Telekom's lab (Germany), TU Berlin (Germany), Intel Collaborative Research Institute for Secure Computing at Aalto University (Finland), and University of Oxford (United Kingdom). He has found several protocol flaws in 3G/4G/5G technologies (affecting billions of devices) and assisted in improving 4G/5G security standards. Also, he is a frequent speaker at several leading security (hacking/academic) conferences and is listed in the Hall of Fame of Google, Qualcomm, Huawei, and GSMA.
-
Altaf Shaik
- Senior Research Scientist, Technischen Universität Berlin
Dr.-Ing. Altaf Shaik is currently a senior researcher at the Technical University of Berlin in Germany. He conducts research in telecommunications, especially 5G radio access and core network security. He combines a professional background in programming, wireless communications, and offensive network security. His renowned research exposed several vulnerabilities in the commercial 4G and 5G specifications and commercial networks that allow attackers to perform powerful attacks affecting millions of base stations, handsets, M2M, and NB-IoT devices. Altaf is a frequent speaker at various prestigious international security conferences such as Black Hat USA & Europe, Troopers, T2, SECT, Nullcon, Hardware.io, HITB, and many others. His accomplishments landed him in the hall of fame of Google, Qualcomm, Huawei, and GSMA. He also trains various companies and organizations in exploit development and also building secure networks including their testing and security evaluation.
Links:
Similar Presentations: