Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a comprehensive conference talk from the 38th Chaos Communication Congress (38C3) that delves into the security vulnerabilities of 5G networks, specifically focusing on how roaming agreements can enable Machine-in-the-Middle (MitM) attacks. Learn about the complex nature of cellular roaming implementation in modern smartphones and discover why current security mitigations in 5G networks prove insufficient against sophisticated attackers. Understand how network operators' extensive capabilities, which exceed lawful interception limits, can be exploited without users' knowledge. Examine practical challenges in preventing and detecting roaming-based attacks, and discover various mitigation strategies, including solutions for end-user devices. Gain valuable insights into how these security vulnerabilities could potentially lead to complete phone control through baseband exploitation, and why the current cellular network specifications require significant updates to ensure secure roaming.
Syllabus
38C3 - How Roaming Agreements Enable 5G MitM Attacks
Taught by
media.ccc.de