Learn Python with Generative AI - Self Paced Online
Learn Generative AI, Prompt Engineering, and LLMs for Free
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This conference talk explores vulnerabilities in the consumer Remote SIM Provisioning (RSP) protocol that enables eSIM downloads to mobile devices. Discover how the GSMA-defined protocol works for downloading SIM profiles to secure elements in phones, and understand the critical security implications for mobile authentication and communication. Learn about the formal methods analysis that revealed several security weaknesses, including over-reliance on TLS encapsulation, problematic trust assumptions regarding download servers, and security risks from compromised secure elements in mobile devices. Examine how the lack of pre-established identifiers contributes to these vulnerabilities and how insufficient verification of user intent can lead to SIM swapping-like attacks. The presenters, Dr. Abu Shohel Ahmed and Professor Tuomas Aura from Aalto University, offer practical solutions for mitigating these vulnerabilities in current eSIM deployments and suggest protocol improvements for enhanced security.
Syllabus
Vulnerabilities in the eSIM download protocol
Taught by
Black Hat