Cracking the 5G Fortress: Peering Into 5G's Vulnerability Abyss

  Рет қаралды 909

Black Hat

Black Hat

Күн бұрын

The advent of 5G technology promises to revolutionize the mobile communication landscape, offering faster speeds and more secure connections. However, this technological leap also introduces many security challenges, particularly within the 5G baseband in mobile phones. Our research introduces 5GBaseChecker, the first ever dynamic security testing framework designed to uncover logical vulnerabilities, e.g., authentication bypass in the protocol implementations of 5G basebands. With the design of new automata learning and differential testing techniques, 5GBaseChecker not only identifies 0-day vulnerabilities but also facilitates the systematic root cause analysis of the security flaws in commercial 5G basebands. Using 5GBaseChecker, we tested 17 commercial 5G basebands and 2 open-source 5G baseband (UE) implementations, uncovering 13 unique 0-day vulnerabilities and a total of 65 vulnerability instances across all tested implementations.
Among our findings, the most critical vulnerability is the "5G AKA Bypass" discovered in one of the widely used 5G basebands. This vulnerability allows attackers to intercept and eavesdrop on victims' Internet data and inject phishing SMS messages. The implications of this attack are profound; it affects users globally who utilize 5G devices with that particular baseband. This flaw violates the underlying security guarantees of 5G technology, leaving users' security and privacy completely compromised.
In summary, in this talk we will introduce a new security analysis tool 5GBaseChecker. We will showcase the application of this framework in identifying critical security vulnerabilities, including a detailed explanation and real-world exploitation video demo of the 5G AKA Bypass flaw in the commercial basebands.
By:
Kai Tu | Research Assistant, The Pennsylvania State University
Yilu Dong | Research Assistant, The Pennsylvania State University
Abdullah Al Ishtiaq | Research Assistant, The Pennsylvania State University
Syed Md Mukit Rashid | Research Assistant, The Pennsylvania State University
Weixuan Wang | Graduate Researcher, The Pennsylvania State University
Tianwei Wu | Research Assistant, The Pennsylvania State University
Syed Rafiul Hussain | Assistant Professor, The Pennsylvania State University
Full Abstract and Presentation Materials:

Пікірлер
Crashing the Party: Vulnerabilities in RPKI Validation
28:12
From Weapon to Target: Quantum Computers Paradox
38:19
Black Hat
Рет қаралды 82
Beat Ronaldo, Win $1,000,000
22:45
MrBeast
Рет қаралды 158 МЛН
Tuna 🍣 ​⁠@patrickzeinali ​⁠@ChefRush
00:48
albert_cancook
Рет қаралды 148 МЛН
Леон киллер и Оля Полякова 😹
00:42
Канал Смеха
Рет қаралды 4,7 МЛН
Каха и дочка
00:28
К-Media
Рет қаралды 3,4 МЛН
Why China’s Luxury Boom Is Over
8:40
Bloomberg Originals
Рет қаралды 141 М.
Network Security - Deep Dive Replay
3:08:19
Kevin Wallace Training, LLC
Рет қаралды 276 М.
The Trillion Dollar Equation
31:22
Veritasium
Рет қаралды 11 МЛН
Making PQ Signatures work in the WebPKI
55:23
PKI Consortium
Рет қаралды 36
CompTIA Network+ Certification Video Course
3:46:51
PowerCert Animated Videos
Рет қаралды 9 МЛН
How do Graphics Cards Work?  Exploring GPU Architecture
28:30
Branch Education
Рет қаралды 3,4 МЛН
Why Hacking is the Future of War
31:45
Johnny Harris
Рет қаралды 3,7 МЛН
OAuth 2.0 and OpenID Connect (in plain English)
1:02:17
OktaDev
Рет қаралды 1,8 МЛН
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Laiture
Рет қаралды 160 М.
Beat Ronaldo, Win $1,000,000
22:45
MrBeast
Рет қаралды 158 МЛН