At DEF CON 31 last year, Tracy Mosley, Vulnerability Researcher at Trenchant presented a talk titled "Nothin’ but a G Thang - The Evolution of Cellular Networks" (background of title). The abstract of the talk says:
In this talk we will walk through each step of cellular evolution, starting at 2G and ending at 5G. The never-ending attack and defend paradigm will be clearly laid out. In order to understand the attack surface, I’ll cover network topology and protocol. For each cellular generation, I will explain known vulnerabilities and some interesting attacks. In response to those vulnerabilities, mitigations for the subsequent cellular generation are put in place. But as we all know, new mitigations mean new opportunities for attackers to get creative. While I will explain most cellular-specific terminology, a familiarity with security concepts will help to better understand this talk. Basic foundations of communications systems, information theory or RF definitely make this talk more enjoyable, but are absolutely not necessary. It’s a dense topic that is highly applicable to those working on anything that touches the cellular network!
The talk is embedded below:
The presentation can be downloaded from here.
Related Posts:
- The 3G4G Blog: Presentations from ETSI Security Conference 2023
- The 3G4G Blog: Top 10 New (2022) Security Standards That You Need to Know About!
- The 3G4G Blog: Authentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5G System (5GS)
- The 3G4G Blog: 5G and Cyber Security
- The 3G4G Blog: Lawful Intelligence and Interception in 5G World with Data and OTT Apps
- 3G4G: Security in 2G, 3G, 4G & 5G Mobile Networks
No comments:
Post a Comment