Let me answer that for you: exploiting broadcast information in cellular networks

  • Authors:
  • Nico Golde;Kévin Redon;Jean-Pierre Seifert

  • Affiliations:
  • Technische Universität Berlin and Deutsche Telekom Innovation Laboratories;Technische Universität Berlin and Deutsche Telekom Innovation Laboratories;Technische Universität Berlin and Deutsche Telekom Innovation Laboratories

  • Venue:
  • SEC'13 Proceedings of the 22nd USENIX conference on Security
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Mobile telecommunication has become an important part of our daily lives. Yet, industry standards such as GSM often exclude scenarios with active attackers. Devices participating in communication are seen as trusted and non-malicious. By implementing our own baseband firmware based on OsmocomBB, we violate this trust and are able to evaluate the impact of a rogue device with regard to the usage of broadcast information. Through our analysis we show two new attacks based on the paging procedure used in cellular networks. We demonstrate that for at least GSM, it is feasible to hijack the transmission of mobile terminated services such as calls, perform targeted denial of service attacks against single subscribers and as well against large geographical regions within a metropolitan area.