File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning
Title | Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning |
---|---|
Authors | |
Issue Date | 2023 |
Citation | 32nd USENIX Security Symposium, USENIX Security 2023, 2023, v. 5, p. 3529-3546 How to Cite? |
Abstract | Conformance tests are critical for finding security weaknesses in carrier network systems. However, building a conformance test procedure from specifications is challenging, as indicated by the slow progress made by the 3GPP, particularly in developing security-related tests, even with a large amount of resources already committed. A unique challenge in building the procedure is that a testing system often cannot directly invoke the condition event in a security requirement or directly observe the occurrence of the operation expected to be triggered by the event. Addressing this issue requires an event chain to be found, which once initiated leads to a chain reaction so the testing system can either indirectly triggers the target event or indirectly observe the occurrence of the expected event. To find a solution to this problem and make progress towards a fully automated conformance test generation, we developed a new approach called Contester, which utilizes natural language processing and machine learning to build an event dependency graph from a 3GPP specification, and further perform automated reasoning on the graph to discover the event chains for a given security requirement. Such event chains are further converted by Contester into a conformance test procedure, which is then executed by a testing system to evaluate the compliance of user equipment (UE) with the security requirement. Our evaluation shows that given 22 security requirements from the LTE NAS specification, Contester successfully generated over a hundred test procedures in just 25 minutes. After running these procedures on 22 popular UEs including iPhone 13, Pixel 5a and IoT devices, our approach uncovered 197 security requirement violations, with 190 never reported before, rendering these devices to serious security risks such as MITM, fake base station and reply attacks. |
Persistent Identifier | http://hdl.handle.net/10722/350233 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Yi | - |
dc.contributor.author | Tang, Di | - |
dc.contributor.author | Yao, Yepeng | - |
dc.contributor.author | Zha, Mingming | - |
dc.contributor.author | Wang, Xiao Feng | - |
dc.contributor.author | Liu, Xiaozhong | - |
dc.contributor.author | Tang, Haixu | - |
dc.contributor.author | Liu, Baoxu | - |
dc.date.accessioned | 2024-10-21T04:35:14Z | - |
dc.date.available | 2024-10-21T04:35:14Z | - |
dc.date.issued | 2023 | - |
dc.identifier.citation | 32nd USENIX Security Symposium, USENIX Security 2023, 2023, v. 5, p. 3529-3546 | - |
dc.identifier.uri | http://hdl.handle.net/10722/350233 | - |
dc.description.abstract | Conformance tests are critical for finding security weaknesses in carrier network systems. However, building a conformance test procedure from specifications is challenging, as indicated by the slow progress made by the 3GPP, particularly in developing security-related tests, even with a large amount of resources already committed. A unique challenge in building the procedure is that a testing system often cannot directly invoke the condition event in a security requirement or directly observe the occurrence of the operation expected to be triggered by the event. Addressing this issue requires an event chain to be found, which once initiated leads to a chain reaction so the testing system can either indirectly triggers the target event or indirectly observe the occurrence of the expected event. To find a solution to this problem and make progress towards a fully automated conformance test generation, we developed a new approach called Contester, which utilizes natural language processing and machine learning to build an event dependency graph from a 3GPP specification, and further perform automated reasoning on the graph to discover the event chains for a given security requirement. Such event chains are further converted by Contester into a conformance test procedure, which is then executed by a testing system to evaluate the compliance of user equipment (UE) with the security requirement. Our evaluation shows that given 22 security requirements from the LTE NAS specification, Contester successfully generated over a hundred test procedures in just 25 minutes. After running these procedures on 22 popular UEs including iPhone 13, Pixel 5a and IoT devices, our approach uncovered 197 security requirement violations, with 190 never reported before, rendering these devices to serious security risks such as MITM, fake base station and reply attacks. | - |
dc.language | eng | - |
dc.relation.ispartof | 32nd USENIX Security Symposium, USENIX Security 2023 | - |
dc.title | Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.scopus | eid_2-s2.0-85176110884 | - |
dc.identifier.volume | 5 | - |
dc.identifier.spage | 3529 | - |
dc.identifier.epage | 3546 | - |