Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

How Roaming Agreements Enable 5G Machine-in-the-Middle Attacks

media.ccc.de via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a comprehensive conference talk from the 38th Chaos Communication Congress (38C3) that delves into the security vulnerabilities of 5G networks, specifically focusing on how roaming agreements can enable Machine-in-the-Middle (MitM) attacks. Learn about the complex nature of cellular roaming implementation in modern smartphones and discover why current security mitigations in 5G networks prove insufficient against sophisticated attackers. Understand how network operators' extensive capabilities, which exceed lawful interception limits, can be exploited without users' knowledge. Examine practical challenges in preventing and detecting roaming-based attacks, and discover various mitigation strategies, including solutions for end-user devices. Gain valuable insights into how these security vulnerabilities could potentially lead to complete phone control through baseband exploitation, and why the current cellular network specifications require significant updates to ensure secure roaming.

Syllabus

38C3 - How Roaming Agreements Enable 5G MitM Attacks

Taught by

media.ccc.de

Reviews

Start your review of How Roaming Agreements Enable 5G Machine-in-the-Middle Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.