Real threats to your data bills: Security loopholes and defenses in mobile data charging

Chunyi Peng, Chi-Yu Li, Hongyi Wang, Guan Hua Tu, Songwu Lu

研究成果: Conference contribution同行評審

24 引文 斯高帕斯(Scopus)

摘要

Secure mobile data charging (MDC) is critical to cellular network operations. It must charge the right user for the right volume that (s)he authorizes to consume (i.e., requirements of authentication, authorization, and accounting (AAA)). In this work, we conduct security analysis of the MDC system in cellular networks. We find that all three can be breached in both design and practice, and identify three concrete vulnerabilities: authentication bypass, authorization fraud and accounting volume inaccuracy. The root causes lie in technology fundamentals of cellular networks and the Internet IP design, as well as imprudent implementations. We devise three showcase attacks to demonstrate that, even simple attacks can easily penetrate the operational 3G/4G cellular networks. We further propose and evaluate defense solutions.

原文English
主出版物標題Proceedings of the ACM Conference on Computer and Communications Security
發行者Association for Computing Machinery
頁面727-738
頁數12
ISBN(列印)9781450329576
DOIs
出版狀態Published - 3 11月 2014
事件21st ACM Conference on Computer and Communications Security, CCS 2014 - Scottsdale, 美國
持續時間: 3 11月 20147 11月 2014

出版系列

名字Proceedings of the ACM Conference on Computer and Communications Security
ISSN(列印)1543-7221

Conference

Conference21st ACM Conference on Computer and Communications Security, CCS 2014
國家/地區美國
城市Scottsdale
期間3/11/147/11/14

指紋

深入研究「Real threats to your data bills: Security loopholes and defenses in mobile data charging」主題。共同形成了獨特的指紋。

引用此