Vulnerabilities in LTE access network protocols

Practical attacks against LTE/4G access network protocols

4G mobile communication networks, also known as “LTE” (Long Term Evolution) are widely deployed. In this project, we set out to investigate how good LTE security and privacy mechanisms are. We discovered several surprising lapses. We have been working with manufacturers and standards organizations to address these problems. You can find a blog post with a brief overview in our research group’s blog.

People

Results

Demos
Research papers
Media

This work is funded in part by: