DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yang, H | ko |
dc.contributor.author | Bae, S | ko |
dc.contributor.author | Son, M | ko |
dc.contributor.author | Kim, H | ko |
dc.contributor.author | Kim, SongMin | ko |
dc.contributor.author | Kim, Yongdae | ko |
dc.date.accessioned | 2019-09-03T08:20:09Z | - |
dc.date.available | 2019-09-03T08:20:09Z | - |
dc.date.created | 2019-06-25 | - |
dc.date.created | 2019-06-25 | - |
dc.date.created | 2019-06-25 | - |
dc.date.created | 2019-06-25 | - |
dc.date.created | 2019-06-25 | - |
dc.date.issued | 2019-08-14 | - |
dc.identifier.citation | USENIX Security '19 , pp.55 - 72 | - |
dc.identifier.uri | http://hdl.handle.net/10203/266662 | - |
dc.description.abstract | Long-Term Evolution (LTE) communication is based on an open medium; thus, a legitimate signal can potentially be counterfeited by a malicious signal. Although most LTE signaling messages are protected from modification using cryptographic primitives, broadcast messages in LTE have never been integrity protected. In this paper, for the first time, we present a signal injection attack that exploits the fundamental weaknesses of broadcast messages in LTE and modifies a transmitted signal over the air. This attack, which is referred to as signal overshadowing (named SigOver) has several advantages and differences when compared with existing attacks using a fake base station. For example, with a 3 dB power difference from a legitimate signal, the SigOver attack demonstrated a 98% success rate when compared with the 80% success rate of attacks achieved using a fake base station, even with a 35 dB power difference. Given that the SigOver attack is a novel primitive attack, it yields five new attack scenarios and implications. Finally, a discussion on two potential countermeasures leaves practical and robust defense mechanism as a future work. | - |
dc.language | English | - |
dc.publisher | USENIX | - |
dc.title | Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE | - |
dc.type | Conference | - |
dc.identifier.wosid | 000509775000004 | - |
dc.identifier.scopusid | 2-s2.0-85075921656 | - |
dc.type.rims | CONF | - |
dc.citation.beginningpage | 55 | - |
dc.citation.endingpage | 72 | - |
dc.citation.publicationname | USENIX Security '19 | - |
dc.identifier.conferencecountry | US | - |
dc.identifier.conferencelocation | Hyatt Regency Santa Clara | - |
dc.contributor.localauthor | Kim, SongMin | - |
dc.contributor.localauthor | Kim, Yongdae | - |
dc.contributor.nonIdAuthor | Yang, H | - |
dc.contributor.nonIdAuthor | Bae, S | - |
dc.contributor.nonIdAuthor | Son, M | - |
dc.contributor.nonIdAuthor | Kim, H | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.