Defeating IMSI catchers CCS 2015 10-13-2015 Denver Fabian van den - - PowerPoint PPT Presentation

defeating imsi catchers
SMART_READER_LITE
LIVE PREVIEW

Defeating IMSI catchers CCS 2015 10-13-2015 Denver Fabian van den - - PowerPoint PPT Presentation

Defeating IMSI catchers CCS 2015 10-13-2015 Denver Fabian van den Broek, Roel Verdult and Joeri de Ruiter IMSI catching For this talk: IMSI catching == catching IMSIs (and nothing else) IMSI catching For this talk: IMSI catching ==


slide-1
SLIDE 1

Defeating IMSI catchers

CCS 2015 10-13-2015 Denver

Fabian van den Broek, Roel Verdult and Joeri de Ruiter

slide-2
SLIDE 2

IMSI catching

For this talk: IMSI catching == catching IMSIs (and nothing else)

slide-3
SLIDE 3

IMSI catching

For this talk: IMSI catching == catching IMSIs (and nothing else) IMSI catching is an attack that works on all generations of mobile networks

slide-4
SLIDE 4

So, what is an IMSI?

slide-5
SLIDE 5

So, what is an IMSI?

  • IMSI = International Mobile Subscriber Identity
  • unique identifier of a SIM
  • IMEI = IMSI = phone number
slide-6
SLIDE 6

So, what is an IMSI? (II)

15 digits that identify:

  • home country
  • home network
  • user

Example IMSI:

310030123456789

slide-7
SLIDE 7

So, what is an IMSI? (II)

15 digits that identify:

  • home country
  • home network
  • user

Example IMSI:

310030123456789

  • The United States
slide-8
SLIDE 8

So, what is an IMSI? (II)

15 digits that identify:

  • home country
  • home network
  • user

Example IMSI:

310030123456789

  • The United States
  • AT&T
slide-9
SLIDE 9

So, what is an IMSI? (II)

15 digits that identify:

  • home country
  • home network
  • user

Example IMSI:

310030123456789

  • The United States
  • AT&T
slide-10
SLIDE 10

And the IMSI is broadcasted in plain text!

slide-11
SLIDE 11

IMSI catchers

  • passive
  • active
slide-12
SLIDE 12

IMSI catchers

  • passive
  • active
  • eavesdropping and insertion
slide-13
SLIDE 13

IMSI catchers

  • passive
  • active
  • eavesdropping and insertion
  • expensive and exclusively sold to governments
slide-14
SLIDE 14

IMSI catchers

  • passive
  • active
  • eavesdropping and insertion
  • expensive and exclusively sold to governments
  • r home made for $100,-
slide-15
SLIDE 15

Why catch IMSIs?

  • IMSIs reveal information
slide-16
SLIDE 16

Why catch IMSIs?

  • IMSIs reveal information
  • Attack location privacy
slide-17
SLIDE 17

Why catch IMSIs?

  • IMSIs reveal information
  • Attack location privacy

– Tracking

slide-18
SLIDE 18

Why catch IMSIs?

  • IMSIs reveal information
  • Attack location privacy

– Tracking – Location monitoring

slide-19
SLIDE 19

Why catch IMSIs?

  • IMSIs reveal information
  • Attack location privacy

– Tracking – Location monitoring

  • Linking identities to devices
slide-20
SLIDE 20

Why catch IMSIs?

  • IMSIs reveal information
  • Attack location privacy

– Tracking – Location monitoring

  • Linking identities to devices
slide-21
SLIDE 21

Why catch IMSIs?

  • IMSIs reveal information
  • Attack location privacy

– Tracking – Location monitoring

  • Linking identities to devices
slide-22
SLIDE 22

Why catch IMSIs?

  • IMSIs reveal information
  • Attack location privacy

– Tracking – Location monitoring

  • Linking identities to devices
slide-23
SLIDE 23

3G+4G authentication (simplified)

SIM IMSI, K, SQN Serving network Home network IMSI → Ki, SQNi identity request identity response (IMSI) IMSI

1

RAND, AUTN, XRES, CK authentication request (RAND, AUTN)

2 3

authentication response (SRES) verify SRES = XRES encrypted using CK Location Update(IMSI)

slide-24
SLIDE 24

Who is to blame?

slide-25
SLIDE 25

Who is to blame?

slide-26
SLIDE 26

Who is to blame?

slide-27
SLIDE 27

Our solution

  • uses temporary pseudonyms: PMSIs
  • can be deployed by any Home network / provider
  • does not prevent IMSI catching, but hinders attack goals (e.g.

tracking, etc.)

  • is formally verified using ProVerif
  • successor PMSIs are only known to SIM and Home network
  • the Home network generates successor PMSIs
slide-28
SLIDE 28

Our solution

  • uses temporary pseudonyms: PMSIs
  • can be deployed by any Home network / provider
  • does not prevent IMSI catching, but hinders attack goals (e.g.

tracking, etc.)

  • is formally verified using ProVerif
  • successor PMSIs are only known to SIM and Home network
  • the Home network generates successor PMSIs,

but how to get them to the SIM?

slide-29
SLIDE 29

3G+4G solution

SIM P, P′, κ, K, SQN Serving network Home network PMSI → P, P′, κi, Ki, SQNi identity request P ← P′ identity response (P) P

1

RAND, AUTN, XRES, CK authentication request (RAND, AUTN)

2

3

authentication response (SRES) verify SRES = XRES encrypted using CK Location Update(P)

slide-30
SLIDE 30

3G+4G solution