IMSI-catch me if you can: IMSI-catcher-catchers

作者: Adrian Dabrowski , Nicola Pianta , Thomas Klepp , Martin Mulazzani , Edgar Weippl

DOI: 10.1145/2664243.2664272

关键词:

摘要: IMSI Catchers are used in mobile networks to identify and eavesdrop on phones. When, the number of vendors increased prices dropped, device became available much larger audiences. Self-made devices based open source software for about US$ 1,500.In this paper, we describe multiple methods detecting artifacts network produced by such devices. We present two independent novel implementations an Catcher (ICC) detect threat against everyone's privacy. The first one employs a stationary (sICC) measurement units installed geographical area constantly scanning all frequency bands cell announcements fingerprinting parameters. These rooftop-mounted can cover large areas. second implementation is app standard consumer grade phones (mICC), without need root or jailbreak them. Its core principle upon topology correlation, facilitating ubiquitous built-in GPS receiver today's capabilities technique. latter works vicinity phone learning landscape than matching it learned data. implemented evaluated both solutions digital self-defense deployed several long term field-test. Finally, how recently published denial service attacks.

参考文章(12)
Eli Biham, Orr Dunkelman, Nathan Keller, A Related-Key Rectangle Attack on the Full KASUMI Lecture Notes in Computer Science. pp. 443- 461 ,(2005) , 10.1007/11593447_24
Ulrich Kühn, Cryptanalysis of Reduced-Round MISTY theory and application of cryptographic techniques. pp. 325- 339 ,(2001) , 10.1007/3-540-44987-6_20
Nico Golde, Kévin Redon, Jean-Pierre Seifert, Let me answer that for you: exploiting broadcast information in cellular networks usenix security symposium. pp. 33- 48 ,(2013)
Stefan Emeis, Klaus Schäfer, Christoph Münkel, Surface-based remote sensing of the mixing-layer height a review Meteorologische Zeitschrift. ,vol. 17, pp. 621- 630 ,(2008) , 10.1127/0941-2948/2008/0312
Narseo Vallina-Rodriguez, Andrius Auçinas, Mario Almeida, Yan Grunenberger, Konstantina Papagiannaki, Jon Crowcroft, RILAnalyzer: a comprehensive 3G monitor on your phone internet measurement conference. pp. 257- 264 ,(2013) , 10.1145/2504730.2504764
Ulrike Meyer, Susanne Wetzel, A man-in-the-middle attack on UMTS Proceedings of the 2004 ACM workshop on Wireless security - WiSe '04. pp. 90- 97 ,(2004) , 10.1145/1023646.1023662
Dong Chao, Universal Software Radio Peripheral Journal of Military Communications Technology. ,(2010)
Nathan Keller, Orr Dunkelman, Adi Shamir, A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony. IACR Cryptology ePrint Archive. ,vol. 2010, pp. 13- ,(2010)
Asael Dror, Secret codes BYTE archive. ,vol. 14, pp. 267- 270 ,(1989)