File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning

TitleSherlock on Specs: Building LTE Conformance Tests through Automated Reasoning
Authors
Issue Date2023
Citation
32nd USENIX Security Symposium, USENIX Security 2023, 2023, v. 5, p. 3529-3546 How to Cite?
AbstractConformance tests are critical for finding security weaknesses in carrier network systems. However, building a conformance test procedure from specifications is challenging, as indicated by the slow progress made by the 3GPP, particularly in developing security-related tests, even with a large amount of resources already committed. A unique challenge in building the procedure is that a testing system often cannot directly invoke the condition event in a security requirement or directly observe the occurrence of the operation expected to be triggered by the event. Addressing this issue requires an event chain to be found, which once initiated leads to a chain reaction so the testing system can either indirectly triggers the target event or indirectly observe the occurrence of the expected event. To find a solution to this problem and make progress towards a fully automated conformance test generation, we developed a new approach called Contester, which utilizes natural language processing and machine learning to build an event dependency graph from a 3GPP specification, and further perform automated reasoning on the graph to discover the event chains for a given security requirement. Such event chains are further converted by Contester into a conformance test procedure, which is then executed by a testing system to evaluate the compliance of user equipment (UE) with the security requirement. Our evaluation shows that given 22 security requirements from the LTE NAS specification, Contester successfully generated over a hundred test procedures in just 25 minutes. After running these procedures on 22 popular UEs including iPhone 13, Pixel 5a and IoT devices, our approach uncovered 197 security requirement violations, with 190 never reported before, rendering these devices to serious security risks such as MITM, fake base station and reply attacks.
Persistent Identifierhttp://hdl.handle.net/10722/350233

 

DC FieldValueLanguage
dc.contributor.authorChen, Yi-
dc.contributor.authorTang, Di-
dc.contributor.authorYao, Yepeng-
dc.contributor.authorZha, Mingming-
dc.contributor.authorWang, Xiao Feng-
dc.contributor.authorLiu, Xiaozhong-
dc.contributor.authorTang, Haixu-
dc.contributor.authorLiu, Baoxu-
dc.date.accessioned2024-10-21T04:35:14Z-
dc.date.available2024-10-21T04:35:14Z-
dc.date.issued2023-
dc.identifier.citation32nd USENIX Security Symposium, USENIX Security 2023, 2023, v. 5, p. 3529-3546-
dc.identifier.urihttp://hdl.handle.net/10722/350233-
dc.description.abstractConformance tests are critical for finding security weaknesses in carrier network systems. However, building a conformance test procedure from specifications is challenging, as indicated by the slow progress made by the 3GPP, particularly in developing security-related tests, even with a large amount of resources already committed. A unique challenge in building the procedure is that a testing system often cannot directly invoke the condition event in a security requirement or directly observe the occurrence of the operation expected to be triggered by the event. Addressing this issue requires an event chain to be found, which once initiated leads to a chain reaction so the testing system can either indirectly triggers the target event or indirectly observe the occurrence of the expected event. To find a solution to this problem and make progress towards a fully automated conformance test generation, we developed a new approach called Contester, which utilizes natural language processing and machine learning to build an event dependency graph from a 3GPP specification, and further perform automated reasoning on the graph to discover the event chains for a given security requirement. Such event chains are further converted by Contester into a conformance test procedure, which is then executed by a testing system to evaluate the compliance of user equipment (UE) with the security requirement. Our evaluation shows that given 22 security requirements from the LTE NAS specification, Contester successfully generated over a hundred test procedures in just 25 minutes. After running these procedures on 22 popular UEs including iPhone 13, Pixel 5a and IoT devices, our approach uncovered 197 security requirement violations, with 190 never reported before, rendering these devices to serious security risks such as MITM, fake base station and reply attacks.-
dc.languageeng-
dc.relation.ispartof32nd USENIX Security Symposium, USENIX Security 2023-
dc.titleSherlock on Specs: Building LTE Conformance Tests through Automated Reasoning-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.scopuseid_2-s2.0-85176110884-
dc.identifier.volume5-
dc.identifier.spage3529-
dc.identifier.epage3546-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats