Fuzzing Cellular Networks for fun and profit - if allowed
- 15:00 7th June 2019 ( Trinity Term 2019 )Tony Hoare Room, Robert Hooke Building
In the past 7 years, I have been working on cellular security publishing more than 10 papers. Throughout these studies, and interactions with device vendors and carriers, I learned a lot about cellular related industry and found that many of the vulnerabilities came from business logic around cellular technologies. As a professor in academia, I will talk about my experience on cellular security and its relation to business logics of cellular technologies in the first part of the talk. I will link existing vulnerabilities with these problems to show how they are related.
In the second part of the talk, I will present LTEFuzz, a semi-automatic dynamic testing tool for LTE control plane procedures.
LTEFuzz dynamically generates and sends the test cases to a target network or a device, and further deterministically classifies problematic behavior by only inspecting the responses in the tester and victim device from the target. By conducting tests against the operational network, we found 51 vulnerabilities (36 new and 15 previously known).