Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE

Cited 30 time in webofscience Cited 0 time in scopus
  • Hit : 546
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorYang, Hko
dc.contributor.authorBae, Sko
dc.contributor.authorSon, Mko
dc.contributor.authorKim, Hko
dc.contributor.authorKim, SongMinko
dc.contributor.authorKim, Yongdaeko
dc.date.accessioned2019-09-03T08:20:09Z-
dc.date.available2019-09-03T08:20:09Z-
dc.date.created2019-06-25-
dc.date.created2019-06-25-
dc.date.created2019-06-25-
dc.date.created2019-06-25-
dc.date.created2019-06-25-
dc.date.issued2019-08-14-
dc.identifier.citationUSENIX Security '19 , pp.55 - 72-
dc.identifier.urihttp://hdl.handle.net/10203/266662-
dc.description.abstractLong-Term Evolution (LTE) communication is based on an open medium; thus, a legitimate signal can potentially be counterfeited by a malicious signal. Although most LTE signaling messages are protected from modification using cryptographic primitives, broadcast messages in LTE have never been integrity protected. In this paper, for the first time, we present a signal injection attack that exploits the fundamental weaknesses of broadcast messages in LTE and modifies a transmitted signal over the air. This attack, which is referred to as signal overshadowing (named SigOver) has several advantages and differences when compared with existing attacks using a fake base station. For example, with a 3 dB power difference from a legitimate signal, the SigOver attack demonstrated a 98% success rate when compared with the 80% success rate of attacks achieved using a fake base station, even with a 35 dB power difference. Given that the SigOver attack is a novel primitive attack, it yields five new attack scenarios and implications. Finally, a discussion on two potential countermeasures leaves practical and robust defense mechanism as a future work.-
dc.languageEnglish-
dc.publisherUSENIX-
dc.titleHiding in Plain Signal: Physical Signal Overshadowing Attack on LTE-
dc.typeConference-
dc.identifier.wosid000509775000004-
dc.identifier.scopusid2-s2.0-85075921656-
dc.type.rimsCONF-
dc.citation.beginningpage55-
dc.citation.endingpage72-
dc.citation.publicationnameUSENIX Security '19-
dc.identifier.conferencecountryUS-
dc.identifier.conferencelocationHyatt Regency Santa Clara-
dc.contributor.localauthorKim, SongMin-
dc.contributor.localauthorKim, Yongdae-
dc.contributor.nonIdAuthorYang, H-
dc.contributor.nonIdAuthorBae, S-
dc.contributor.nonIdAuthorSon, M-
dc.contributor.nonIdAuthorKim, H-
Appears in Collection
EE-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 30 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0