Defeating IMSI catchers
CCS 2015 10-13-2015 Denver
Fabian van den Broek, Roel Verdult and Joeri de Ruiter
Defeating IMSI catchers CCS 2015 10-13-2015 Denver Fabian van den - - PowerPoint PPT Presentation
Defeating IMSI catchers CCS 2015 10-13-2015 Denver Fabian van den Broek, Roel Verdult and Joeri de Ruiter IMSI catching For this talk: IMSI catching == catching IMSIs (and nothing else) IMSI catching For this talk: IMSI catching ==
CCS 2015 10-13-2015 Denver
Fabian van den Broek, Roel Verdult and Joeri de Ruiter
IMSI catching
For this talk: IMSI catching == catching IMSIs (and nothing else)
IMSI catching
For this talk: IMSI catching == catching IMSIs (and nothing else) IMSI catching is an attack that works on all generations of mobile networks
So, what is an IMSI?
So, what is an IMSI?
So, what is an IMSI? (II)
15 digits that identify:
Example IMSI:
So, what is an IMSI? (II)
15 digits that identify:
Example IMSI:
So, what is an IMSI? (II)
15 digits that identify:
Example IMSI:
So, what is an IMSI? (II)
15 digits that identify:
Example IMSI:
And the IMSI is broadcasted in plain text!
IMSI catchers
IMSI catchers
IMSI catchers
IMSI catchers
Why catch IMSIs?
Why catch IMSIs?
Why catch IMSIs?
– Tracking
Why catch IMSIs?
– Tracking – Location monitoring
Why catch IMSIs?
– Tracking – Location monitoring
Why catch IMSIs?
– Tracking – Location monitoring
Why catch IMSIs?
– Tracking – Location monitoring
Why catch IMSIs?
– Tracking – Location monitoring
3G+4G authentication (simplified)
SIM IMSI, K, SQN Serving network Home network IMSI → Ki, SQNi identity request identity response (IMSI) IMSI
RAND, AUTN, XRES, CK authentication request (RAND, AUTN)
authentication response (SRES) verify SRES = XRES encrypted using CK Location Update(IMSI)
Who is to blame?
Who is to blame?
Who is to blame?
Our solution
tracking, etc.)
Our solution
tracking, etc.)
but how to get them to the SIM?
3G+4G solution
SIM P, P′, κ, K, SQN Serving network Home network PMSI → P, P′, κi, Ki, SQNi identity request P ← P′ identity response (P) P
1
RAND, AUTN, XRES, CK authentication request (RAND, AUTN)
2
3
authentication response (SRES) verify SRES = XRES encrypted using CK Location Update(P)
3G+4G solution