Vulnerabilities in LTE access network protocols

Practical attacks against LTE/4G access network protocols

4G mobile communication networks, also known as “LTE” (Long Term Evolution) are widely deployed. In this project, we set out to investigate how good LTE security and privacy mechanisms are. We discovered several surprising lapses. We have been working with manufacturers and standards organizations to address these problems. You can find a blog post with a brief overview in our research group’s blog.



Research papers

This work is funded in part by: