Insecurity of voice solution VoLTE in LTE mobile networks

Chi-Yu Li, Guan Hua Tu, Chunyi Peng, Zengwen Yuan, Yuanjie Li, Songwu Lu, Xinbing Wang

研究成果: Conference contribution同行評審

75 引文 斯高帕斯(Scopus)

摘要

VoLTE (Voice-over-LTE) is the designated voice solution to the LTE mobile network, and its worldwide deployment is underway. It reshapes call services from the traditional circuit-switched telecom telephony to the packet-switched Internet VoIP. In this work, we conduct the first study on VoLTE security before its full rollout. We discover several vulnerabilities in both its control-plane and dataplane functions, which can be exploited to disrupt both data and voice in operational networks. In particular, we find that the adversary can easily gain free data access, shut down continuing data access, or subdue an ongoing call, etc. We validate these proof-of-concept attacks using commodity smartphones (rooted and unrooted) in two Tier-1 US mobile carriers. Our analysis reveals that, the problems stem from both the device and the network. The device OS and chipset fail to prohibit non-VoLTE apps from accessing and injecting packets into VoLTE control and data planes. The network infrastructure also lacks proper access control and runtime check.

原文English
主出版物標題CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
發行者Association for Computing Machinery
頁面316-327
頁數12
ISBN(電子)9781450338325
DOIs
出版狀態Published - 12 10月 2015
事件22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015 - Denver, 美國
持續時間: 12 10月 201516 10月 2015

出版系列

名字Proceedings of the ACM Conference on Computer and Communications Security
2015-October
ISSN(列印)1543-7221

Conference

Conference22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015
國家/地區美國
城市Denver
期間12/10/1516/10/15

指紋

深入研究「Insecurity of voice solution VoLTE in LTE mobile networks」主題。共同形成了獨特的指紋。

引用此