2016
DOI: 10.1016/j.cose.2016.03.005
|View full text |Cite
|
Sign up to set email alerts
|

(U)SimMonitor: A mobile application for security evaluation of cellular networks

Abstract: The lack of precise directives in 3GPP specifications allows mobile operators to configure and deploy security mechanisms at their sole discretion. This may lead to the adoption of bad security practices and insecure configurations. Based on this observation, this paper presents the design and implementation of a novel mobile application named (U)SimMonitor that captures and analyses the security policy that a cellular operator enforces i.e., the invocation and employment of the specified security measures to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…In case that the MNO supports A5/1, then in order to verify its vulnerability level, the use of padding randomization and inclusion of IMEI should also be examined. In [36] has been proved that only one MNO in Greece supported such measurement. Additionally, in [29] describes the use of passive behavioral analysis of control traffic in order to detect downgrade attacks against the cryptographic algorithms.…”
Section: B Mno Misconfiguration (Class B)mentioning
confidence: 97%
See 4 more Smart Citations
“…In case that the MNO supports A5/1, then in order to verify its vulnerability level, the use of padding randomization and inclusion of IMEI should also be examined. In [36] has been proved that only one MNO in Greece supported such measurement. Additionally, in [29] describes the use of passive behavioral analysis of control traffic in order to detect downgrade attacks against the cryptographic algorithms.…”
Section: B Mno Misconfiguration (Class B)mentioning
confidence: 97%
“…According to the report, Greek MNOs have lately adopted some of the recommended measurements thus, they are moving towards safer communications. The work in [36] presented a tool, which captured and analyzed the security policy of MNOs. More specifically, "(U)SimMonitor" inspected the traffic to estimate the usage of each technology (2G or 3G), the employed algorithms for encryption, as well as, the frequency of AKA, TMSI and IMSI allocation.…”
Section: A Cellular Network Attacks Threats and Vulnerabilitiesmentioning
confidence: 99%
See 3 more Smart Citations