Prochecker: An automated security and privacy analysis framework for 4g lte protocol implementations

I Karim, SR Hussain, E Bertino - 2021 IEEE 41st International …, 2021 - ieeexplore.ieee.org
2021 IEEE 41st International Conference on Distributed Computing …, 2021ieeexplore.ieee.org
Cellular protocol implementations must comply with the specifications, and the security and
privacy requirements. These implementations, however, often deviate from the security and
privacy requirements due to under specifications in cellular standards, inherent protocol
complexities, and design flaws inducing logical vulnerabilities. Detecting such logical
vulnerabilities in the complex and stateful 4G LTE protocol is challenging due to operational
dependencies on internal-states, and intertwined complex protocol interactions among …
Cellular protocol implementations must comply with the specifications, and the security and privacy requirements. These implementations, however, often deviate from the security and privacy requirements due to under specifications in cellular standards, inherent protocol complexities, and design flaws inducing logical vulnerabilities. Detecting such logical vulnerabilities in the complex and stateful 4G LTE protocol is challenging due to operational dependencies on internal-states, and intertwined complex protocol interactions among multiple participants. In this paper, we address these challenges and develop ProChecker which- (1) extracts a precise semantic model as a finite-state machine of the implementation by combining dynamic testing with static instrumentation, and (2) verifies the properties against the extracted model by combining a symbolic model checker and a cryptographic protocol verifier. We demonstrate the effectiveness of ProChecker by evaluating it on a closed-source and two of the most popular open-source 4G LTE control-plane protocol implementations with 62 properties. ProChecker unveiled 3 new protocol-specific logical attacks, 6 implementation issues, and detected 14 prior attacks. The impact of the attacks range from denial-of-service, broken integrity, encryption, and replay protection to privacy leakage.
ieeexplore.ieee.org