Skip to main content

Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks

  • Conference paper
  • First Online:
Foundations and Practice of Security (FPS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13877))

Included in the following conference series:

Abstract

Mobile networks are essential for modern societies. High bandwidth and low latency communications for massive numbers of subscribers have enabled various applications with much impact on life quality. However, the widespread of mobile network communications has also increased the interest in security and privacy issues. In this work, a known 4G and 5G NSA vulnerability, attach request fingerprinting, is examined in detail and a novel classification method for attach request fingerprinting is proposed and extensively evaluated. The novel method significantly increases the severity of the privacy attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. 3GPP: Ts 24.008 mobile radio interface layer 3 specification; core network protocols; stage 3 (2022)

    Google Scholar 

  2. 4Gmobiletech: LTE basics (2022). https://www.4gmobiletech.com/basics

  3. Aznar, P.: Decision trees: Gini vs entropy (2020). https://quantdare.com/decision-trees-gini-vs-entropy/

  4. Fraunholz, D., Schoerghofer-Vrinssen, R., Konig, H., Zahoransky, R.: Show me your attach request and ill tell you who you are: Practical finterprinting attacks in 4G and 5G mobile networks (2022)

    Google Scholar 

  5. Department, S.R.: Number of smartphones sold to end users worldwide from 2007 to 2021 – statista (2022). https://www.statista.com/statistics/263437/global-smartphone-sales-to-end-users-since-2007/. Accessed 16 May 2022

  6. ETSI TS 124 301 v9.7.0 124, 301. https://www.etsi.org/deliver/etsi_ts/124300_124399/124301/09.07.00_60/ts_124301v090700p.pdf

  7. INFO I: Pixel 6 und pixel 6 pro verwenden ein 5G-modem von samsung und umgehen qualcomm (2021). https://br.atsit.in/de/?p=136873

  8. Khan, H., Martin, K.: A survey of subscription privacy on the 5G radio interface - the past, present and future. WiSec (2020)

    Google Scholar 

  9. Quandt, R.: Nach intel fällt bald qualcomm: Apple baut eigene smartphone-modems (2020). https://winfuture.de/news,119991.html

  10. Rupprecht, D., Dabrowski, A., Holz, T., Weippl, E.R., Pöpper, C.: On security research towards future mobile network generations. CoRR abs/1710.08932 (2017). http://arxiv.org/abs/1710.08932

  11. Shaik, A., Borgaonkar, R., Park, S., Seifert, J.P.: New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, pp. 221–231. WiSec 2019, Association for Computing Machinery, New York (2019). https://doi.org/10.1145/3317549.3319728

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Fraunholz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fraunholz, D., Brunke, D., Dumanski, L., Koenig, H. (2023). Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks. In: Jourdan, GV., Mounier, L., Adams, C., Sèdes, F., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2022. Lecture Notes in Computer Science, vol 13877. Springer, Cham. https://doi.org/10.1007/978-3-031-30122-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-30122-3_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-30121-6

  • Online ISBN: 978-3-031-30122-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics