DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Hong Il | ko |
dc.contributor.author | Kim, Dongkwan | ko |
dc.contributor.author | Kwon, Min Hee | ko |
dc.contributor.author | Han, Hyung Seok | ko |
dc.contributor.author | Jang, Yeong Hin | ko |
dc.contributor.author | Han, Dong Su | ko |
dc.contributor.author | Kim, Tae Soo | ko |
dc.contributor.author | Kim, Yong Dae | ko |
dc.date.accessioned | 2016-04-18T04:57:17Z | - |
dc.date.available | 2016-04-18T04:57:17Z | - |
dc.date.created | 2015-11-20 | - |
dc.date.created | 2015-11-20 | - |
dc.date.created | 2015-11-20 | - |
dc.date.created | 2015-11-20 | - |
dc.date.issued | 2015-10-13 | - |
dc.identifier.citation | 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp.328 - 339 | - |
dc.identifier.uri | http://hdl.handle.net/10203/204307 | - |
dc.description.abstract | Long Term Evolution (LTE) is becoming the dominant cellular networking technology, shifting the cellular network away from its circuit-switched legacy towards a packet-switched network that resembles the Internet. To support voice calls over the LTE network, operators have introduced Voice-over-LTE (VoLTE), which dramatically changes how voice calls are handled, both from user equipment and infrastructure perspectives. We find that this dramatic shift opens up a number of new attack surfaces that have not been previously explored. To call attention to this matter, this paper presents a systematic security analysis. Unlike the traditional call setup, the VoLTE call setup is controlled and performed at the Application Processor (AP), using the SIP over IP. A legitimate user who has control over the AP can potentially control and exploit the call setup process to establish a VoLTE channel. This combined with the legacy accounting policy (e.g., unlimited voice and the separation of data and voice) leads to a number of free data channels. In the process of unveiling the free data channels, we identify a number of additional vulnerabilities of early VoLTE implementations, which lead to serious exploits, such as caller spoofing, over-billing, and denial-of-service attacks. We identify the nature of these vulnerabilities and concrete exploits that directly result from the adoption of VoLTE. We also propose immediate countermeasures that can be employed to alleviate the problems. However, we believe that the nature of the problem calls for a more comprehensive solution that eliminates the root causes at mobile devices, mobile platforms, and the core network. | - |
dc.language | English | - |
dc.publisher | Association for Computing Machinery | - |
dc.title | Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations | - |
dc.type | Conference | - |
dc.identifier.wosid | 000412403900028 | - |
dc.identifier.scopusid | 2-s2.0-84954133059 | - |
dc.type.rims | CONF | - |
dc.citation.beginningpage | 328 | - |
dc.citation.endingpage | 339 | - |
dc.citation.publicationname | 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015 | - |
dc.identifier.conferencecountry | US | - |
dc.identifier.conferencelocation | Denver, Colorado, USA | - |
dc.identifier.doi | 10.1145/2810103.2813718 | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Han, Dong Su | - |
dc.contributor.localauthor | Kim, Yong Dae | - |
dc.contributor.nonIdAuthor | Kwon, Min Hee | - |
dc.contributor.nonIdAuthor | Han, Hyung Seok | - |
dc.contributor.nonIdAuthor | Jang, Yeong Hin | - |
dc.contributor.nonIdAuthor | Kim, Tae Soo | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.