Abstract
Mobile networks are essential for modern societies. High bandwidth and low latency communications for massive numbers of subscribers have enabled various applications with much impact on life quality. However, the widespread of mobile network communications has also increased the interest in security and privacy issues. In this work, a known 4G and 5G NSA vulnerability, attach request fingerprinting, is examined in detail and a novel classification method for attach request fingerprinting is proposed and extensively evaluated. The novel method significantly increases the severity of the privacy attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
3GPP: Ts 24.008 mobile radio interface layer 3 specification; core network protocols; stage 3 (2022)
4Gmobiletech: LTE basics (2022). https://www.4gmobiletech.com/basics
Aznar, P.: Decision trees: Gini vs entropy (2020). https://quantdare.com/decision-trees-gini-vs-entropy/
Fraunholz, D., Schoerghofer-Vrinssen, R., Konig, H., Zahoransky, R.: Show me your attach request and ill tell you who you are: Practical finterprinting attacks in 4G and 5G mobile networks (2022)
Department, S.R.: Number of smartphones sold to end users worldwide from 2007 to 2021 – statista (2022). https://www.statista.com/statistics/263437/global-smartphone-sales-to-end-users-since-2007/. Accessed 16 May 2022
ETSI TS 124 301 v9.7.0 124, 301. https://www.etsi.org/deliver/etsi_ts/124300_124399/124301/09.07.00_60/ts_124301v090700p.pdf
INFO I: Pixel 6 und pixel 6 pro verwenden ein 5G-modem von samsung und umgehen qualcomm (2021). https://br.atsit.in/de/?p=136873
Khan, H., Martin, K.: A survey of subscription privacy on the 5G radio interface - the past, present and future. WiSec (2020)
Quandt, R.: Nach intel fällt bald qualcomm: Apple baut eigene smartphone-modems (2020). https://winfuture.de/news,119991.html
Rupprecht, D., Dabrowski, A., Holz, T., Weippl, E.R., Pöpper, C.: On security research towards future mobile network generations. CoRR abs/1710.08932 (2017). http://arxiv.org/abs/1710.08932
Shaik, A., Borgaonkar, R., Park, S., Seifert, J.P.: New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, pp. 221–231. WiSec 2019, Association for Computing Machinery, New York (2019). https://doi.org/10.1145/3317549.3319728
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Fraunholz, D., Brunke, D., Dumanski, L., Koenig, H. (2023). Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks. In: Jourdan, GV., Mounier, L., Adams, C., Sèdes, F., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2022. Lecture Notes in Computer Science, vol 13877. Springer, Cham. https://doi.org/10.1007/978-3-031-30122-3_12
Download citation
DOI: https://doi.org/10.1007/978-3-031-30122-3_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-30121-6
Online ISBN: 978-3-031-30122-3
eBook Packages: Computer ScienceComputer Science (R0)