Lteinspector: A Systematic Approach For Adversarial Testing of 4G Lte
Lteinspector: A Systematic Approach For Adversarial Testing of 4G Lte
Lteinspector: A Systematic Approach For Adversarial Testing of 4G Lte
2
Security and Privacy Threats on Cellular
Network
IMSI
No No
IMSI = International Mobile Subscriber Identity No
Service
No
Service
Service Service
3
Limitations of Existing Attack Finding
Strategies for Cellular Networks
Detach VoLTE
Paging Handover
Man-in-the-Middle
Spurious billing Life threatening risks
Attacker
Challenges 1
Preliminaries
2
LTEInspector 3
4 Findings &
Attack Validation
Responsible Disclosure 5
and Impact
6 Future Work
Conclusion 7
6
Challenges
q Stateful procedures and multiple
participants
q Closed system
ü Proprietary
q Legal barrier
ü Licensed spectrum
7
Challenges 1
Preliminaries
2
LTEInspector 3
4 Findings &
Attack Validation
Responsible Disclosure 5
and Impact
6 Future Work
Conclusion 7
8
Background: LTE Architecture
eNodeB
PGW
eNodeB
eNodeB
Background (Attach)
Security algorithm TMSI Exchange
Identification Authentication
negotiation
Connection Setup
Attach Request (IMSI/IMEI, UE’s Security Capabilities)
Selectand
Network accepts the attach Security Algorithm
Challenge
allocates (LTE:
(LTE:
temporary Security
Authentication
identity Mode
(LTE: Command)
Request)
Attach Accept)
ResponseAttach
Confirm (LTE:and
Security new temporary
Authentication
Algorithm identity(LTE:
Response)
(LTE: Security ModeAttach Complete)
Complete)
10
Background (Paging & Detach)
UE eNodeB MME
paging_request
Paging
detach_request
detach_accept
11
Challenges 1
Preliminaries
2
LTEInspector 3
4 Findings &
Attack Validation
Responsible Disclosure 5
and Impact
6 Future Work
Conclusion 7
12
Adversary Model
q Dolev-Yao model
Ø Eavesdrop
Ø Drop or modify
Ø Inject
Ø Adheres to cryptographic assumptions
13
Insight
q Property characteristics
§ Temporal ordering of events
§ Cryptographic constructs
§ Linear integer arithmetic and other
predicates
temporal trace
q Intuition: property Cryptographic
ü Model checker & Constructs
Linear integer
ü Cryptographic protocol verifier arithmetic
UE state machine Core network state Adversarial model Threat instrumented abstract LTE
machine ecosystem model
Crypto.
protocol Model
verifier checker
Domain Desired
Testbed Counter-
knowledge properties from
example
Attacks standard
/auth failure
th reject
mme sqn + 1, auth request —mobile ^ restart /
auth_response∧
ƒauth
/auth failure attach_request∕
xres ma
start /attach request
MME xres_matches_s MME
(mac failure _ ¬(ue sqn xsqn ue sqn + rang
§ Abstract away cryptographic disconnected 1
MME MME_sqn = waits for security m
authenticates
“auth request ^ res ∕
MME_sqn + 1, auth_response attach_request∕
constructs
¿attach request/ auth_request MME Security_mode
MME_sqn =
UE equest )/
MME § Two unidirectional channels
mme sqn = mme sqn + 1, 3 _command
6
/ue sqn = xsqn + 1, auth response wait for MME_sqn + 1,
4
connected
MME auth request attach_request∕ auth request 16
< ue sqn + range) auth response auth_request
—mobile restart/attach request
Œauth request ^
Adversarial
UE Model Instrumentor
mobile restart/attach request UE
wait for (¬mac failure ^ (ue sqn xsqn
UE
authenticates
Disconnected < ue sqn + range)
auth request MME
/ue sqn = xsqn + 1, auth response
Õ(auth reject
attach_request
_ detach request)/ Dolev Yao Attacker
“auth request ^
auth_response adversary_turn
(mac failure _ ¬(ue sqn xsqn ue sqn + range))
Ã
sec_mode_command
mobile restart/attach request /auth failure
attach_complete
attach_request
auth_request∧
𝑎𝑢𝑡ℎ_𝑟𝑒𝑗𝑒𝑐𝑡∨𝑑𝑒𝑡𝑎𝑐ℎ
6
auth_request∧
_𝑟𝑒𝑞𝑢𝑒𝑠𝑡 ∕—
(¬mac_failure ∧ authentication_reject
(mac_failure ∨ (UE_sqn ≤xsqn
2 7
¬(UE_sqnmobile_restart∕≤ UE_sqn +
attach_request
8
≤xsqn≤UE_sqn + range)) ∕UE_sqn =
UE auth_request∧
UE
range)) ∕
UE auth_failure
mobile_restart
waits for (¬mac_failure xsqn + 1,
∧ UE
auth_response
Emergency
1 waits for 5 authenticates calls only
disconnected ∕attach_request auth_request
auth_request (UE_sqn MME
4
𝑎𝑢𝑡ℎ _ 𝑟𝑒𝑗𝑒𝑐𝑡∨
≤xsqn≤UE_sqn 9
𝑑𝑒𝑡𝑎𝑐ℎ_𝑟𝑒𝑞𝑢𝑒𝑠𝑡∕3— + range))
auth_request∧
mobile_restart
18
(mac_failure ∨ ¬(UE_sqn
Cryptographic Protocol Verifier
q Injective-correspondence (authentication)
Every authentication_reject message received by UE must be sent by the core network
q ProVerif
§ Secrecy
§ Authenticity
§ Observational equivalence
19
Testbed Validation
q Malicious eNodeB setup (USRP, OpenLTE,
srsLTE)
q COTS smartphones
20
Challenges 1
Preliminaries
2
LTEInspector 3
Findings &
4 Attack Validation
Responsible Disclosure 5
and Impact
6 Future Work
Conclusion 7
21
Findings
q Uncovered 10 new attacks
Attack Procedures Responsible Notable Impacts
Auth Sync. Failure Attach 3GPP DoS
Traceability Attach carriers Coarse-grained location tracking
Numb using auth_reject Attach 3GPP, smartphones DoS
Authentication relay Attach 3GPP Location spoofing
Paging Channel Hijacking Paging 3GPP DoS
Stealthy Kicking-off Paging 3GPP DoS, coarse-grained location tracking
Panic Paging 3GPP Artificial chaos for terrorist activity
Energy Depletion Paging 3GPP Battery depletion/DoS
Linkability Paging 3GPP Coarse-grained location tracking
Targeted/Non-targeted Detach 3GPP DoS
Detach
q Identified 9 prior attacks: IMSI-catching, DoS, Linkability, MitM in 3G and 2G, etc. 22
Authentication Synchronization Failure Attack
q Assumption:
Ø Victim UE’s IMSI
Ø Malicious UE setup
Malicious UE Victim UE Core Network
𝐼𝑀𝑆𝐼
𝑆𝑄𝑁↓𝑈𝐸 𝑆𝑄𝑁↓𝐶𝑁
attach_request (IMSI) =𝑥 =𝑥
attach_request (IMSI) 𝑆𝑄𝑁↓𝐶𝑁
attach_request (IMSI) 𝑆++
𝑄𝑁↓𝐶𝑁
…. ++
𝑆𝑄𝑁↓𝐶𝑁
attach_request (MSI) ++
𝑆𝑄𝑁↓𝐶𝑁
++
UE and CN sequence numbers get desynchronized 23
Panic Attack
paging (ETWS)
24
Attack Chaining (Authentication Relay or
Mafia Attack)
Indiana
Connected
Authentication_response
Authentication_request
Attach_request
NID Authentication_response
Attach_request
Authentication_request
Authentication_re
Authentication
sponse
_request
Attach_request
Indiana California 25
Challenges 1
Preliminaries
2
LTEInspector 3
Findings &
4 Attack Validation
Responsible Disclosure
and Impact 5
6 Future Work
Conclusion 7
26
Responsible Disclosure and Impacts
q Mobile network operators
27
Challenges 1
Preliminaries
2
LTEInspector 3
Findings &
4 Attack Validation
Responsible Disclosure
and Impact 5
6 Future Work
Conclusion 7
28
Future Work
UE eNodeB MME
NAS NAS
29
Challenges 1
Preliminaries
2
LTEInspector 3
Findings &
4 Attack Validation
Responsible Disclosure
and Impact 5
6 Future Work
Conclusion 7
30
Conclusion
Proposed a systematic approach for analyzing the specification
https://github.com/relentless-warrior/LTEInspector
31
Questions
32
LTEInspector: A Systematic Approach for
Adversarial Testing of 4G LTE
q ProVerif
§ Secrecy
§ Authenticity
§ Observational equivalence
(hyper-properties)
q Why not ProVerif only?
§ Rich temporal trace properties
§ Constraints on linear integer
arithmetic
34
Traceability attack
q Assumption:
Ø Victim UE’s IMSI
Ø Malicious UE setup
Ø secutity_mode_command
attach_request
….
security_mode_command (MAC, nonce)
….
attach_complete
security_mode_command security_mode_command
security_mode_reject security_mode_complete
35
Numb Attack
q Assumption: malicious eNodeB setup
• Learn from SystemInformationBlock messages
authentication_reject
NID
Connected
tracking_area_update_request
Emergency
calls only
Background (Attach)
Security algorithm TMSI Exchange
Identification Authentication
negotiation
UE eNodeB MME
Connection Setup
Attach Request (IMSI/IMEI, UE’s Security Capabilities)
Selectand
Network accepts the attach Security Algorithm
Challenge
allocates (LTE:
(LTE:
temporary Security
Authentication
identity Mode
(LTE: Command)
Request)
Attach Accept)
ResponseAttach
Confirm (LTE:and
Security new temporary
Authentication
Algorithm identity(LTE:
Response)
(LTE: Security ModeAttach Complete)
Complete)
Time
Time
Time
37