lteinspector: a systematic approach for adversarial ... · lteinspector: a systematic approach for...

35
LTEInspector : A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta Mehnaz*, Elisa Bertino* Purdue University*, University of Iowa

Upload: others

Post on 24-Sep-2019

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE

Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta Mehnaz*, Elisa Bertino*Purdue University*, University of Iowa†

Page 2: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

2

Critical Infrastructure using Cellular Network

Page 3: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Security and Privacy Threats on Cellular Network

3

IMSI

No

Service

No

ServiceNo

Service

No

Service

IMSI = International Mobile Subscriber Identity

Page 4: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

4

No Systematic Approach

No adversary, just analyze the performance, and reliability

Limitations of Existing Attack Finding Strategies for Cellular Networks

❑ Is it possible to build a Systematic framework for adversarially analyzing the cellular network specification in order to find security and privacy related problems?

Page 5: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Scope

Man-in-the-MiddleAttacker

Spurious billing Life threatening risks

Attach

Detach VoLTE

Paging Handover

SMS

Page 6: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

1

2

3

4

5

6

7

Challenges

Preliminaries

LTEInspector

Findings &Attack Validation

Responsible Disclosure and Impact

Future Work

Conclusion

6

Page 7: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

❑ Stateful procedures and multiple participants

❑ 4G LTE lacks formal specification ✓written in natural language

❑ Closed system✓Proprietary

❑ Legal barrier✓Licensed spectrum

Challenges

7

Page 8: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

1

2

3

4

5

6

7

Challenges

Preliminaries

LTEInspector

Findings &Attack Validation

Responsible Disclosure and Impact

Future Work

Conclusion

8

Page 9: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

MME

HSS

SGW

PCRF

PGW

Evolved Packet Core (EPC)

Internet

UE

eNodeB

eNodeB

eNodeB

eNodeB

eNodeB

eNodeB

eNodeB

eNodeB

Background: LTE Architecture

Page 10: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Background (Attach)

10

Identification Authentication (𝐶𝐾, 𝐼𝐾, 𝐾𝐴𝑆𝑀𝐸)

Security Algorithm Selection (𝐾𝑁𝐴𝑆𝑒𝑛𝑐 , 𝐾𝑁𝐴𝑆𝑖𝑛𝑡)

TMSI ExchangeIP assignment

Attach Request (IMSI/IMEI, UE’s Security Capabilities)

Connection Setup

Challenge (LTE: Authentication Request)

Response (LTE: Authentication Response)

Select Security Algorithm (LTE: Security Mode Command)

Confirm Security Algorithm (LTE: Security Mode Complete)

Network accepts the attach and allocates temporary identity (LTE: Attach Accept)

Confirm Attach and new temporary identity(LTE: Attach Complete)

UE Core NetworkeNodeB

Page 11: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Background (Paging & Detach)

11

paging_request

Paging

UE MMEeNodeB

detach_request

detach_accept

Page 12: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Model Checking

12

Not a kind of model

Model:

abstract behavior of the system

Property, 𝞿

Model Checker

Verified

Violated, Not verified

Page 13: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

1

2

3

4

5

6

7

Challenges

Preliminaries

LTEInspector

Findings &Attack Validation

Responsible Disclosure and Impact

Future Work

Conclusion

13

Page 14: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Adversary Model

❑ Dolev-Yao model

➢ Eavesdrop

➢ Drop or modify

➢ Inject

➢ Adheres to cryptographic assumptions

❑Why Dolev-Yao model?➢ Powerful adversary

➢ Automatic tools (ProVerif, Tamarin) can leverage

14

Page 15: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Insight

❑ Property characteristics▪ Temporal ordering of events

▪ Cryptographic constructs (Confidentiality, Integrity, availability)

▪ Linear integer arithmetic and other predicates • SQN++ and verify SQN ≤ XSQN ≤ (SQN + range)

❑ Intuition: ✓Model checker

✓ Cryptographic protocol verifier

15

How can we leverage reasoning power of these two?

temporal trace property

&Linear integer

arithmetic

CryptographicConstructs

P

P

Next (P)

Eventually (P)

PP P PAlways (P)

QP P PUntil (P, Q)

Page 16: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

LTEInspector

UE state machine Core network state machine

Adversarial model Threat instrumented abstract LTE ecosystem model

Model checker

Desired properties from standard

Counter-example

Crypto. protocol verifier

Domain knowledge

Testbed

Attacks

Page 17: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Abstract LTE Model Construction

17

Standard

attach_request ∕

MME_sqn = MME_sqn + 1,auth_request

1

MMEwaits for

auth_response

MMEauthenticates

UE

auth_failure ∕—

2

attach_request ∕MME_sqn= MME_sqn + 1, auth_request

auth_response ∧xres_matches_sres ∕

Security_mode_command

attach_request ∕MME_sqn =MME_sqn + 1, auth_request

34

5

6

MMEdisconnected

UEdisconnected

mobile_restart∕ attach_request

1

auth_request ∧(¬mac_failure ∧ (UE_sqn ≤xsqn ≤ UE_sqn + range))

∕ UE_sqn = xsqn + 1,auth_response

5

mobile_restart ∕ attach_request8

auth_request ∧(mac_failure ∨ ¬(UE_sqn ≤ xsqn ≤UE_sqn + range)) ∕ auth_failure

2

auth_request ∧(¬mac_failure ∧ (UE_sqn ≤ xsqn≤ UE_sqn + range)) ∕ UE_sqn =

xsqn + 1, auth_response

7

𝑎𝑢𝑡ℎ_𝑟𝑒𝑗𝑒𝑐𝑡 ∨ 𝑑𝑒𝑡𝑎𝑐ℎ_𝑟𝑒𝑞𝑢𝑒𝑠𝑡 ∕—

6

auth_request ∧

(mac_failure ∨ ¬(UE_sqn ≤ xsqn ≤ UE_sqn +range)) ∕ auth_failure

9𝑎𝑢𝑡ℎ_𝑟𝑒𝑗𝑒𝑐𝑡 ∨

𝑑𝑒𝑡𝑎𝑐ℎ_𝑟𝑒𝑞𝑢𝑒𝑠𝑡 ∕—4

mobile_restart∕ attach_request

3

UEwaits for

auth_request

UEauthenticates

MME❑ Specification Model for NAS layer

(UE-MME) interactions

▪ Propositional logic level

▪ Model message types only, not message data

▪ Abstract away cryptographic constructs

▪ Two unidirectional channels

Page 18: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Adversarial Model Instrumentor

18

𝑚𝑈𝐸 = attach_request

𝑚𝑎𝑑𝑣 = no_operation (drop)

𝑚𝑎𝑑𝑣 = detach_request (inject)

adversary_turn

UE MME

Dolev Yao Attackerattach_request

auth_response

sec_mode_command

attach_complete

auth_request

sec_mode_command

attach_accept

paging_request

benign_turn

Page 19: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Model Checker

❑ Temporal trace properties➢ Liveness – something good eventually happens➢ Safety – nothing bad happens

❑ NuSMV

19

UEdisconnected

mobile_restart∕ attach_request

1

auth_request ∧(¬mac_failure ∧ (UE_sqn ≤xsqn ≤ UE_sqn + range))

∕ UE_sqn = xsqn + 1,auth_response

5

mobile_restart ∕ attach_request8

auth_request ∧(mac_failure ∨ ¬(UE_sqn ≤ xsqn ≤UE_sqn + range)) ∕ auth_failure

2

auth_request ∧(¬mac_failure ∧ (UE_sqn ≤ xsqn≤ UE_sqn + range)) ∕ UE_sqn =

xsqn + 1, auth_response

7

𝑎𝑢𝑡ℎ_𝑟𝑒𝑗𝑒𝑐𝑡 ∨ 𝑑𝑒𝑡𝑎𝑐ℎ_𝑟𝑒𝑞𝑢𝑒𝑠𝑡 ∕—

6

auth_request ∧

(mac_failure ∨ ¬(UE_sqn ≤ xsqn ≤ UE_sqn +range)) ∕ auth_failure

9𝑎𝑢𝑡ℎ_𝑟𝑒𝑗𝑒𝑐𝑡 ∨

𝑑𝑒𝑡𝑎𝑐ℎ_𝑟𝑒𝑞𝑢𝑒𝑠𝑡 ∕—4

mobile_restart∕ attach_request

3

UEwaits for

auth_request

UEauthenticates

MME

𝞿1: It is always the case that whenever UE is in the wait

for auth request, it will eventually authenticate MME.

attach_request

authentication_reject

UEwaits for

auth_request

UEauthenticates

MME

Emergency calls only

MMEVictim UERogue

Base Station

Page 20: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Cryptographic Protocol Verifier

20

❑ Injective-correspondence (authentication)Every authentication_reject message received by UE must be sent by the core network

❑ ProVerif▪ Secrecy

▪ Authenticity

▪ Observational equivalence attach_requestauthentication_reject

Emergency calls only

Victim UE MMERogue

Base Station

paging_with_IMSI

locally detached

Page 21: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Testbed Validation

21

❑ Malicious eNodeB setup (USRP, OpenLTE, srsLTE)

❑ Malicious UE setup (USRP, srsUE)

❑ COTS smartphones

❑ SIM cards of four major US carriers

❑ Custom-built core network ❑USRP, OpenLTE, srsLTE, and USIM

Page 22: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

1

2

3

4

5

6

7

Challenges

Preliminaries

LTEInspector

Findings &Attack Validation

Responsible Disclosure and Impact

Future Work

Conclusion

22

Page 23: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Findings

23

Attack Procedures Responsible Notable Impacts

Auth Sync. Failure Attach 3GPP DoS

Traceability Attach carriers Coarse-grained location tracking

Numb using auth_reject Attach 3GPP, smartphones DoS

Authentication relay Attach 3GPP Location spoofing

Paging Channel Hijacking Paging 3GPP DoS

Stealthy Kicking-off Paging 3GPP DoS, coarse-grained location tracking

Panic Paging 3GPP Artificial chaos for terrorist activity

Energy Depletion Paging 3GPP Battery depletion/DoS

Linkability Paging 3GPP Coarse-grained location tracking

Targeted/Non-targeted Detach

Detach 3GPP DoS

❑ Uncovered 10 new attacks

❑ Identified 9 prior attacks: IMSI-catching, DoS, Linkability, MitM in 3G and 2G, etc.

Page 24: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Authentication Synchronization Failure Attack

24

attach_request (IMSI)

….

❑ Assumption: Victim UE’s IMSI

𝑆𝑄𝑁𝑈𝐸 = 𝑥 𝑆𝑄𝑁𝐶𝑁 = 𝑥

𝑆𝑄𝑁𝐶𝑁++attach_request (IMSI)

𝑆𝑄𝑁𝐶𝑁++attach_request (IMSI)

𝑆𝑄𝑁𝐶𝑁++attach_request (MSI)

𝑆𝑄𝑁𝐶𝑁++UE and CN sequence numbers get desynchronized

𝐼𝑀𝑆𝐼

Victim UE Core NetworkMalicious UE

❑ Vulnerability: ➢ UE’s attach_request doesn’t require to be authenticated.➢ Core network increments SQN for unsolicited attach_request messages.

Page 25: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Traceability attack

25

attach_request

attach_complete

….

….

security_mode_command (MAC, nonce)

security_mode_complete

security_mode_command

security_mode_reject

security_mode_command

❑ Assumption: captures messages (esp. security_mode_command) in attach procedure

Victim UE Core NetworkAnother UE

❑ Vulnerability: MAC of security_mode_command is generated/verified with 𝐾𝐴𝑆𝑀𝐸 . No replay protection is enforced using nonce.

Rogue eNodeB

Page 26: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Panic Attack

26

paging (ETWS)

Page 27: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Authentication Relay or Mafia Attack (Next Generation Fake Base Station)

27

Connected

NIDAttach_request

Attach_request

Attach_requestAuthentication_request

Authentication _request

Authentication_requestAuthentication_response

Authentication_response

Authentication_response

Indiana

CaliforniaIndiana

Page 28: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Authentication Relay’s Impact

28

❑ Location history poisoning➢ false alibi or fake evidence in criminal case

investigation.

❑ Complete or selective DoS

❑ Service profiling/fingerprinting

Page 29: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

1

2

3

4

5

6

7

Challenges

Preliminaries

LTEInspector

Findings &Attack Validation

Responsible Disclosure and Impact

Future Work

Conclusion

29

Page 30: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Responsible Disclosure and Impacts

❑Mobile network operators

❑ Resolved the issue of using EEA0 (no encryption)

❑ Other issues are in progress

30

Page 31: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

1

2

3

4

5

6

7

Challenges

Preliminaries

LTEInspector

Findings &Attack Validation

Responsible Disclosure and Impact

Future Work

Conclusion

31

Page 32: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Future Work

32

NAS

RRC RRC RRC

NAS

RRC

UE MMEeNodeB

PCCH-Message ::= SEQUENCE+-message ::= CHOICE [c1]

+-c1 ::= CHOICE [paging]+-paging ::= SEQUENCE [0110]

+-pagingRecordList ::= SEQUENCE OF OPTIONAL:Omit+-systemInfoModification ::= ENUMERATED [true]

OPTIONAL:Exist+-etws-Indication ::= ENUMERATED [true] OPTIONAL:Exist+-nonCriticalExtension ::= SEQUENCE OPTIONAL:Omit

Page 33: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

1

2

3

4

5

6

7

Challenges

Preliminaries

LTEInspector

Findings &Attack Validation

Responsible Disclosure and Impact

Future Work

Conclusion

33

Page 34: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Conclusion

Proposed a systematic approach for analyzing the specification

Uncovered 10 new attacks and 9 prior attacks

Validated most of the attacks in a testbed

https://github.com/relentless-warrior/LTEInspector

34

Page 35: LTEInspector: A Systematic Approach for Adversarial ... · LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury†, Shagufta

Questions

35