Watching your call: Breaking VoLTE Privacy in LTE/5G Networks

نویسندگان

چکیده

Voice over LTE (VoLTE) and NR (VoNR), are two similar technologies that have been widely deployed by operators to provide a better calling experience in 5G networks, respectively. The VoLTE/NR protocols rely on the security features of underlying LTE/5G network protect users' privacy such nobody can monitor calls learn details about call times, duration, direction. In this paper, we introduce new attack which enables adversaries analyse encrypted traffic recover any details. We achieve implementing novel mobile-relay adversary is able remain undetected using an improved physical layer parameter guessing procedure. This facilitates recovery configuration messages exchanged between victim devices mobile network. further propose identity mapping method our link victim's identifiers phone number efficiently, requiring single VoLTE protocol message. evaluate real-world performance attacks four modern commercial off-the-shelf phones representative, carriers. collect 60 hours networks execute 160 calls, use successfully identify patterns allocation traffic, Our experiments show works as expected all test cases, activity logs recovered describe actual communication with 100% accuracy. Finally, International Mobile Subscriber Identities (IMSI), Concealed Identifiers (SUCI) and/or Globally Unique Temporary (GUTI) numbers while remaining victim.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Is Somebody Watching Your Facebook Newsfeed?

With the popularity of Social Networking Services (SNS), more and more sensitive information are stored online and associated with SNS accounts. The obvious value of SNS accounts motivates the usage stealing problem—unauthorized, stealthy use of SNS accounts on the devices owned/used by account owners without any technology hacks. For example , anxious parents may use their kids' SNS accounts t...

متن کامل

Privacy in Danger: Let's Google Your Privacy

Protection of personal data is a requirement from both ethical and legal perspectives. In the Internet, search engines facilitate our lives by finding any searched information within a single-click time. On the other hand, they threaten our privacy by revealing our personal data to others. In this paper, we give concrete examples of Google personal data exploits against user privacy, discuss th...

متن کامل

Whoʼs Watching Your Children? Value Propositions in Preteen Virtual Worlds

This poster presents a critical, values-oriented investigation of a specific space within the online universe: shared virtual playgrounds designed for preteens. Specifically we investigate three preteen worlds with a focus on the sites’ technical features designed to support value concerns (e.g. privacy, security, obedience) and critically examine the potential influence of these features from ...

متن کامل

Your Privacy Is in Your Hand: Interactive Visual Privacy Control with Tags and Gestures

Built–in cameras on mobile and wearable devices enable a number of vision related applications, such as mobile augmented reality, continuous sensing, and life-logging systems. While wearable cameras with smaller size and higher resolution bring joy and convenience to human lives, being recorded by unreliable cameras has raised people’s concerns about visual privacy, particularly the potential l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings on Privacy Enhancing Technologies

سال: 2023

ISSN: ['2299-0984']

DOI: https://doi.org/10.56553/popets-2023-0053