Party Vibe

Register

Welcome To

DE / FI : Boffins build a Euro-stingray

Forums Life Computers, Gadgets & Technology Computer Viruses, Trojans & Threats. DE / FI : Boffins build a Euro-stingray

  • This topic is empty.
Viewing 1 post (of 1 total)
  • Author
    Posts
  • Whilst the USA device can work in Europe; it not only looks like something from 40 years ago and would cost a lot – most likely there is only one in the UK which Metpol NCA and Police Scotland have to share between them.

    in any area which isn’t a complete shithole/ghetto it would cause many modern phones being used online to drop their connections and people would notice this…

    However the folk below have made a 3/4G version of the device.

    Their University is part funded by Deutsche Telekom; at least they are still investing in training over there…

    Mobile communication systems now constitute an essential part of life throughout the world. Fourth generation “Long Term Evolution” (LTE) mobile communication networks are being deployed. The LTE suite of specifications is considered to be significantly better than its predecessors not only in terms of functionality but also with respect to security and privacy for subscribers.
    We carefully analyzed LTE access network protocol specifications and uncovered several vulnerabilities. Using commercial LTE mobile devices in real LTE networks, we demonstrate inexpensive, and practical attacks exploiting these vulnerabilities. Our first class of attacks consists of three different ways of making an LTE device leak its location: A semi-passive attacker can locate an LTE device within a 2 sq.km area within a city whereas an active attacker can precisely locate an LTE device using GPS co-ordinates or trilateration via cell-tower signal strength information. Our second class of attacks can persistently deny some or all services to a target LTE device. To the best of our knowledge, our work constitutes the first publicly reported practical attacks against LTE access network protocols.
    We present several countermeasures to resist our specific attacks. We also discuss possible trade-offs that may explain why these vulnerabilities exist and recommend that safety margins introduced into future specifications to address such trade-offs should incorporate greater agility to accommodate subsequent changes in the trade-off equilibrium

    PDF file below

    http://arxiv.org/pdf/1510.07563v1.pdf

0

Voices

1

Reply

Tags

This topic has no tags

Viewing 1 post (of 1 total)
  • You must be logged in to reply to this topic.

Forums Life Computers, Gadgets & Technology Computer Viruses, Trojans & Threats. DE / FI : Boffins build a Euro-stingray