Extracted Text
kim_sp_2019.pdf
Touching the Untouchables: Dynamic Security
Analysis of the LTE Control Plane
Hongil Kim
KAIST
hongilk@kaist.ac.kr
Jiho Lee
KAIST
jiholee@kaist.ac.kr
Eunkyu Lee
KAIST
ekleez@kaist.ac.kr
Yongdae Kim
KAIST
yongdaek@kaist.ac.kr
AbstractThis paper presents our extensive investigation
of the security aspects of control plane procedures based on
dynamic testing of the control components in operational Long
Term Evolution (LTE) networks. For dynamic testing in LTE
networks, we implemented a semi-automated testing tool, named
LTEFuzz, by using open-source LTE software over which the
user has full control. We systematically generated test cases by
dening three basic security properties by closely analyzing the
standards. Based on the security property, LTEFuzz generates
and sends the test cases to a target network, and classies the
problematic behavior by only monitoring the device-side logs.
Accordingly, we uncovered 36 vulnerabilities, which have not
been disclosed previously. These ndings are categorized into ve
types: Improper handling of (1) unprotected initial procedure,
(2) crafted plain requests, (3) messages with invalid integrity
protection, (4) replayed messages, and (5) security procedure
bypass. We conrmed those vulnerabilities by demonstrating
proof-of-concept attacks against operational LTE networks. The
impact of the attacks is to either deny LTE services to legitimate
users, spoof SMS messages, or eavesdrop/manipulate user data
trafc. Precise root cause analysis and potential countermeasures
to address these problems are presented as well. Cellular carriers
were partially involved to maintain ethical standards as well as
verify our ndings in commercial LTE networks.
I. INTRODUCTION
Long Term Evolution (LTE) is the most advanced telecom-
munication technology thus far. It not only provides faster data
transmission with low latency but also ensures high reliability
and robustness against unexpected failures compared to older
generation networks such as Global System for Mobile com-
munication (GSM), and Universal Mobile Telecommunication
System (UMTS). Mobile network operators are aggressively
deploying LTE infrastructure; as of 2018, 600 carriers in 200
countries have deployed LTE networks, having more than 3.2
billion subscribers worldwide [1], [2].
In addition to facilitating traditional telecommunication ser-
vices such as data and voice call, LTE is considered a key en-
abler for providing always-on mobile connectivity in both the
emerging industries (e.g., autonomous vehicles and the Internet
of Things) and nation-wide communication infrastructure (e.g.,
Public Safety LTE and LTE-R for railway communication).
Typically, these applications are safety-critical and require high
availability and robustness. This means that users could face
a signicant threat to their safety if these applications were to
malfunction by the accidental disconnection of LTE services.
It is therefore pivotal to investigate the potential threats to the
LTE service procedures that can cause unexpected failures as
a result of accidents or adversaries.
The 3rd Generation Partnership Project (3GPP), a de facto
standard for LTE, denes the behavior of all network compo-
nents including security features, which have been signicantly
improved compared to earlier networks (e.g., stronger encryp-
tion and integrity protection algorithms, mandatory use of
integrity protection in control plane protocols) [3]. Moreover, it
provides conformance test suites for commercial LTE chipsets
to ensure compliance with the specication.
In spite of these efforts to eliminate the risks of unexpected
errors, recent studies have uncovered various security vulner-
abilities in the control plane procedures of LTE networks. For
example, an active adversary can relay an LTE communication
between a mobile device and a network to hijack the location
of the device [4] or redirect the DNS request of the device [5].
Attacks using rogue base stations can either track the location
of a user device or deny the LTE service by exploiting
both device side design aws and implementation bugs [6]
[8]. However, none of these studies focused on analyzing
network-side problems in operational LTE networks although
vulnerabilities of this nature can inuence a number of their
subscribers once exploited.
Motivated by the fact that the control plane components
in LTE are still under-explored, we investigated potential
problems of the control plane procedures in operational LTE
networks by dynamically analyzing the core network responses
resulting from carefully crafted malicious inputs. In general,
dynamically testing network behavior is challenging because:
¶Exploiting the control plane protocols with a commercial
smartphone is quite difcult. This is because commercial
devices implement the control plane protocols on a baseband
chipset, from which generation of arbitrary messages is dif-
cult.·The deployed carrier networks are closed systems.
Their congurations are proprietary and the control plane logs
are unavailable to devices. Thus, it is difcult to correctly
determine the root causes of the identied problems on the
device side.¸Transmitting signals to an operational network
using an uncertied device may not be allowed depending on
the regulations for carriers and countries.
We overcome these challenges by utilizing open source
LTE implementations [9][11] for testing purposes. To this
end, we implemented a semi-automated testing tool, named
LTEFuzz, by using fully controllable LTE open source soft-
ware, which 1) dynamically generates and sends the test cases
to a target network or a device [9], and further, 2) classies
problematic behavior by only inspecting the responses in the
tester and victim device from the target. Second, we collab-
orated with carriers to avoid ethical issues. For each of the
critical test cases, we interviewed carriers to establish whether
it would interfere with the LTE network. Suspicious cases that
could interfere with other users were handled independently.
Regarding the regulations on using licensed bands, our tester
device acts as if it were a single LTE device and executes
test messages individually. Therefore, nearby legitimate users
do not experience any interference, performance degradation,
and failure of their LTE services. In addition, we sent spoofed
messages by using the identity of our LTE phone. Thus, only
our phone might experience the intended failure in case our
test case is accepted by the target networks. Lastly, we reason
out the root causes based on 1) a review of 3GPP standards
and 2) interview with the carriers to conrm our ndings.
To generate the test cases systematically, we rst cre-
ated three security properties by extensively analyzing the
correct behavior of network components and their security
requirements mandated in the 3GPP specications. Using these
security properties, we determined the scope of the target
messages and generated rules for specic test cases. Then,
the test case generator mutated the random inputs among the
datasets of the control plane logs of a commercial network,
which we collected globally for approximately one year. The
reason for only considering the inputs in the commercial
logs is to prevent unexpected crashes in the receiving nodes
due to parsing errors. Total test cases cover 13 messages for
inspecting the behavior of network nodes and 29 messages for
inspecting the behavior of commercial devices.
By conducting tests against the operational network, we
found 51 vulnerabilities (36 new and 15 previously known),
which are mainly caused by the improper handling ofÀ
unprotected initial procedures,Ácrafted plain requests,Â
messages with invalid integrity protection,Ãreplayed mes-
sages, andÄsecurity procedure bypass. We also demonstrate
all the attacks by exploiting the vulnerabilities we found in
the operational network while strictly following the ethics. Our
attacks can¶deny various LTE services to either a target user
or arbitrary users,·spoof control plane messages for privacy
leaks,¸send spoofed Short Message Service (SMS), and¹
eavesdrop and manipulate data communication. A complete
list of vulnerabilities is given in the Table IV in the Appendix.
To summarize, our contributions are as follows:
We propose a systematic approach to expose vulnerabilities
in the control plane procedures of LTE networks. Our method
can examine various security aspects in several control plane
protocols by simply creating concrete security properties and
test cases.
To the best of our knowledge, we are the rst to analyze the
security problems caused by incorrect behavior in the control
plane nodes in commercial networks such asRadio Resource
Control (RRC)andNon Access Stratum (NAS)by executing
crafted uplink test cases in both theRRCand theNASlayer.
We demonstrated that most of our ndings are exploitable
by an adversary who would be able to launch critical attacks
such as the denial of LTE services, spoong of both control
and data plane messages, eavesdropping user data trafc, and
conducting phishing attacks on legitimate users.
The remainder of the paper is organized as follows. Sec-
tion II presents an overview of LTE technology with the
network architecture and key control plane procedures. In4G Core Network
S-GW
HSS
MME Billing
Domain
Internet
IMS
4G Access Network
eNB
P-GW
Tracking
Area
Cell
UE
Fig. 1. LTE network architecture
Section III, we introduce our approach to systematically nd
existing vulnerabilities in commercial network environments.
Section IV provides a detailed implementation and experimen-
tal setup of our proposed approach. We present the results of
our test and root cause analysis of each nding in Section V.
The attacks that exploit the identied vulnerabilities are pre-
sented in Sections VI, VII, and VIII. Section IX discusses
potential countermeasures and Section X presents related work.
We conclude our paper and present future work in Section XI.
II. BACKGROUND
This section presents the basic concepts of standard LTE
technology along with network architecture and essential con-
trol plane procedures [12][19].
A. LTE network architecture
Fig. 1 illustrates the LTE network architecture, which
consists of User Equipment (UE), evolved Node B (eNB), and
Evolved Packet Core (EPC) components.
UErefers to a mobile device, which can provide a legitimate
user with subscribed services such as data and voice call by
connecting to a base station. The UE is uniquely identied by
an International Mobile Station Equipment Identity (IMEI).
One distinctive feature of the UE is the use of a Universal
Subscriber Identity Module (USIM), a smart card that can be
physically inserted into the UE, which includes the subscriber
identier known as the International Mobile Subscriber Iden-
tity (IMSI), cryptographic keys, and algorithms.
AneNBis the Base Transceiver Station (BTS) in LTE, which
enables the UE to establish a wireless connection to the LTE
network. A typical eNB has a Baseband Unit (BBU) that
is responsible for processing the baseband signals, and it is
connected to multiple Remote Radio Units (RRUs), which
directly process the transmission and reception of RF signals.
Each RRU covers a sector (also known as a cell), thus, one
eNB can cover multiple cell sites as shown in Fig. 1
1
. The
eNB is connected to a Mobility Management Entity (MME)
for control-plane communication and 4G Gateways (GWs) for
both control-plane and user-plane data transmission.
TheMMEis the key control-node in the LTE network. It
authenticates the UE and manages the mobility status of
subscribers and Evolved Packet System (EPS) bearers. The
cryptographic keys for authenticating and protecting the UE
are contained in the Home Subscriber Server (HSS). The
MME performs UE authentication through an authentication
protocol known as Evolved Packet System-Authentication and
Key Agreement (EPS-AKA) with the key information received
from the HSS. The MME is also involved in the activa-
tion/deactivation process of the EPS bearer, a logical tunnel
1
The number of cells in one eNB can range from 1 to 256 in the specication
and, in practice, this depends on the operators' cell planning.
2
RRC
Radio setup
1
RRC Connection request
RRC Connection setup
NAS Authentication request/response
NAS Attach accept/complete
NAS Security mode command/complete
RRC Security mode command/complete
RRC Connection complete +NAS Attach request
(Random or UE’s S-TMSI)
(UE’s IMSI, GUTI or IMEI)
Authentication vector
Encryption/Integrity algorithm: EEAx/EIAx
RRC Connection reconf.
6
5
Signaling/Data radio bearerNew GUTI or reuse old GUTI
RRC
NAS
NAS
S1AP
S1APMME
eNB UE
+
2 3 4 78 Fig. 2. UE attach procedure with our target control plane protocol stack
created during a session between the UE and GW to service
the Internet connection. Thus, it manages user network access
by setting up and terminating the session. User mobility is
managed by tracking each user's states, stored in the MME
(e.g., whether the UE is attached to the network) and it tracks
the location of the UE in cell units. These cells are grouped
into a Tracking Area (TA).
4G GWsconsist of two types of LTE gateways: a Serving
Gateway (S-GW) and a PDN Gateway (P-GW). These GWs
ensure mobility of the UE and provide Internet service. The
S-GW becomes an anchor point when the UE moves from one
base station to another, which is known as handover, and the
P-GW allocates the IP addresses and manages the accounting
data of the UE. It also connects the UE to the Internet.
B. LTE service procedures
1) UE attach procedure:The initial procedure whereby the
UE attaches to the network (as shown in Fig. 2) is related with
both connecting the RAN (eNB) and the EPC network (MME).
The UE has to establish a radio connection with the eNB rst,
after which it attaches to the EPC network for a full connection
to the Internet through the LTE network.
Connection between the UE and eNB.When the UE is turned
on, it rst nds a suitable cell by listening to broadcasting mes-
sages from nearby base stations according to the settings (e.g.,
operator specic codes, LTE bands, and channels) congured
in the USIM card and the device modem. Once the UE nds a
suitable cell, (1) it initiates the Random Access (RA) procedure
to obtain uplink resource allocation and timing information.
Then, it saves the assigned identity known as a Temporary Cell
Radio Network Temporary Identier (Temporary C-RNTI)
from the selected cell. With this Temporary C-RNTI and the
uplink assignments, (2) the UE attempts to establish aRadio
Resource Control (RRC) Connectionby transmitting anRRC
Connection request. (3) On receiving the request, the eNB
replies with theRRC Connection setupincluding information
about the dedicated radio resource allocation and the C-RNTI
value to be used to distinguish the UE for subsequent radio
communication. (4) Lastly, the UE completes the connection
setup by sending anRRC Connection setup completemes-
sage to the cell. Once all these steps have been performed,
the UE is synchronized with the cell in both the uplink and
downlink. In addition, both the UE and eNB change their
RRCstate fromIDLEtoCONNECTEDas dened in the
3GPP standard [19]. In theRRC CONNECTEDstate, the UE
communicates with the connected cell using theRRCprotocol
for control-plane procedures. In Section V-A, we show that
no security measures are typically adopted in these initial
procedures, thereby causing serious problems in target eNBs.
Connection between UE and MME.Once the UE is success-
fully connected to a nearby eNB, it has to attach to the EPC
network to obtain LTE services. First, (4) the UE piggybacks
theNAS Attach requestto theRRC Connection completeand
sends it to an MME. Upon receiving this message, (5) the
MME starts the Authentication and Key Agreement (AKA)
procedure by replying to theNAS Authentication request
from the UE with anAuthentication vectorgenerated from the
HSS. The UE then authenticates the MME through the contents
in theNAS Authentication requestand replies by sending
anNAS Authentication responseto the MME. At this stage,
both the UE and the MME are mutually authenticated. Next, in
terms of key agreement, (6) the MME selects the encryption
and integrity protection algorithms to use, and sends aNAS
Security mode commandto the UE to inform it about the
selected algorithms. Upon the receipt of this message, the
UE generates security keys for theNASlayer. Likewise,
(7) the eNB proceedsRRC Security mode commandto inform
the security algorithms forRRClayer and user plane data
security. After these steps, all the control plane messages
that should be protected according to the standards [15], [19]
are encrypted and integrity protected using the negotiated
security algorithms. Lastly, after optional congurations are
exchanged in theNASandRRClayer, (8) the MME allocates
a Globally Unique Temporary Identity (GUTI)
2
to substitute
the permanent identity (IMSI in LTE) and sends the GUTI
and other connection information by transmitting anAttach
acceptto the UE. The attach procedure is nally completed
when the UE sends anAttach completemessage to the MME.
2) UE mobility management:As shown in Fig. 1, each
MME manages its own Tracking Areas (TAs), each of which
is identied by a Tracking Area Code (TAC). Each TA contains
several eNBs, which operate several cells to efciently cover
the geographical regions with no signal interference according
to the operating policy of the carrier. Upon arrival of an
incoming service request to a specic UE, the MME rst
checks whether the UE isRRC CONNECTEDorRRC IDLE. If
the UE is in theRRC IDLEstate, the MME has to wake up the
UE to make theRRC Connectionand the other radio bearers
of data trafc. This procedure is known asPagingin LTE
terminology. As the MME only has information about the TA
that previously served the UE, thePagingmessage is broadcast
to all the eNBs in that TA. If the UE is not found in the
particular TA, the MME can broadcast thePagingto the other
TAs. Note that the specicPagingpolicy to nd UEs might
be different across carriers depending on the relative priority
allocated to QoS, the signaling load, and other operating issues.
III. THEPROPOSEDAPPROACH
This section presents LTEFuzz, the proposed approach
to systematically conduct dynamic security analysis in op-
erational LTE networks in a semi-automated way. LTEFuzz
consists of three main steps (as shown in Fig. 3):
(1) Extracting security properties:First, we extensively
analyze the LTE standards of the control plane procedures by
2
The GUTI value consists of MME group id and S-TMSI.
3
2.Generating
& Executing test cases
3.Classifying
problematic behavior and construct attack scenar ios
eNB
Operational LTE network
MME
Commercial devices
Tester
Decision tree
Case 1 Case 2 Case 4Case 3
Attack scenario 1 Attack scenario 2 Attack scenario 3
Problematic
behavior
Test results
(UE side logs)
Test case
Properties
Commercial logs
Test cases
P1
P2
P3
Key agreement
Authentication
Invalid Seq
Plain by
adversary
Plain by
design Invalid MAC
1.Extracting
security pro
perties Fig. 3. Overview of LTEFuzz
focusing on the security aspects. Based on the analysis, we
create three security properties the network and the mobile
devices need to follow to ensure they are protected against
unknown security threats.
(2) Generating test cases:Next, we generate test cases to
identify situations in which the target control plane component
violates the security properties. The test cases are generated
based on the specied rules of target protocol messages and
its elds for each property.
(3) Classifying problematic behavior:When executing the
test cases, we need to determine which responses and state
changes on the side of the UE are considered as problematic
behavior. To this end, we build a simple decision tree logic
to classify the problematic cases. Our model only considers
the control plane logs and states on the UE side when the test
case is executed. This model, therefore, enables LTEFuzz to
identify problematic cases in an automatic way.
The remainder of this section considers each of these steps.
A. Extracting security properties from standards
A thorough analysis of the specications regarding the
control plane procedures and security requirements enabled
us to identify potential security holes that might cause the
condentiality and integrity protection of control plane pro-
cedures be circumvented depending on the implementation
and conguration policies of carriers. First, initial procedures
before establishing a security context might be exploited by
adversaries who are able to eavesdrop and manipulate LTE sig-
nals. Second, quite a few exceptional situations exist in which
the receiving entity would accept the received control plane
message without integrity protection (Section 4.4.4 in [15]
and Appendix 6 in [19]). Third, although the specication
adopts counters for the control plane protocol (such as NAS
and RRC), it species the use of a sequence number (partial
bits of the counter) in the received message when verifying the
message integrity. Therefore, message replay might be allowed.
From these observations, we created the three basic security
properties listed in Table I, each of which focuses on the ability
of the responsible entities to correctly respond to malicious
behavior by an adversary. We assume that the adversary has
minimal privilege: the adversary neither owns valid keys to
register with the LTE network nor do they have information
about other legitimate users' keys. In addition, as each property
focuses on different security aspects (i.e., incorrect handling of
unprotected procedures, invalid security protected messages,
and mandatory AKA procedures), the test scenarios and the
rules of selecting target messages vary from one property to
another. Note that, when considering the security properties,
we only targeted theNASand theRRCprotocol among the
various control plane protocols because (1) these protocols
are used to perform critical control plane procedures between
the UE and the network (e.g., UE attach procedure, mobility
management, and authentication), (2) we were able to capture
and analyze these procedures at the UE, and (3) the identied
vulnerabilities in these protocols directly affect both the UE
and the network.
Each of these properties is explained in more detail below.
1) Property 1:It conrms whether the receiving entity (the
eNB or MME for an uplink and the UE for a downlink)
appropriately handles unexpected inputs when an adversary
sends crafted plain messages during the initial procedures.
To validate this property, we consider two situations when
selecting the target messages: (1) crafted plain messages that
can be sent before security is activated, and (2) messages
that should not be sent unprotected after security activation
according to the standard. For the rst case, we mainly inspect
the potential threats of initial plain messages that cannot be
protected by the nature of the symmetric key cryptography of
LTE. For these unprotected messages, it is hard to distinguish
whether the received message is sent from the adversary
or a benign user. On the other hand, the purpose of the
second situation is to inspect whether the deployed cellular
components are correctly implemented to reject or discard
invalid plain messages that do not comply with the standard.
Messages transmitted after security activation usually adhere
to security critical procedures. Thus, an adversary might affect
the connection state of a UE or expose the private informa-
tion of the UE if the receiving entities incorrectly handle
these security-protected messages. Here we assume that the
adversary neither subscribes to the particular mobile phone
service nor do they have the security keys of the other UE.
Therefore, the adversary would be able to create and send
plain messages with arbitrary contents, but these messages
are not valid ones. During the test, the adversary acts as a
malicious UEwhen investigating the behavior of the eNB and
MME (uplink direction) and as arogue LTE networkwhen
investigating UE behavior (downlink direction).
Example cases.An example of a message representing the rst
situation is anRRC Connection request. Because the initial
RRC Connectionprocedure is not protected by design, an
adversary can spoof any contents while establishing theRRC
Connection. Victim eNBs without proper security measures
would accept these fabricated messages. Another example to
illustrate the second situation could be a plainNAS Attach
requestspoofed with the victim's GUTI. In normal cases,
when UE attempts to perform re-registration with their pre-
vious cryptographic key information (known as thesecurity
contextin 3GPP) and GUTI, an integrity protectedNAS Attach
requestis sent. Upon receiving the message, the MME
allows UE registration without performing an AKA procedure
because the UE is already authenticated by its valid integrity
protected message. Thus, if the MME does not correctly check
whether the received message has to be security protected, an
adversary may disconnect the victim's existing connection by
sending a plainNAS Attach requestspoofed with the victim's
GUTI. A detailed analysis of the consequences of these two
situations is provided in Section V-A and V-B, respectively.
2) Property 2:It validates whether the receiver appro-
priately handles unexpected messages that are incorrectly
4
TABLE I. S ECURITY PROPERTIES FOR SYSTEMATIC SECURITY TESTING
Security property Target procedures/messages Example
P1Invalid plain messages should be properly handled
Messages that are allowed to be sent in plaintextRRC Connection request, IMSI Attach request
Messages that are not allowed to be sent in plaintextGUTI Attach request, Uplink NAS transport
P2Invalid security protected messages should be properly handled
Messages with invalid integrity protection
PDN disconnect request, Service request
Messages with invalid sequence number
P3Mandatory security procedures should not be bypassed
Mutual authentication procedure Authentication request
Key agreement procedure NAS/RRC Security mode command
encapsulated with a security header. According to the spec-
ication [15], allNASmessages after the AKA procedure
should be both encrypted and integrity protected except some
messages, such as anAttach request, aTAU request, and
aSecurity mode command, all of which are only integrity
protected. To this end, when a UE sends anNASmessage after
the AKA procedure, it encrypts the plainNASmessages rst
and then calculates the Message Authentication Code (MAC)
for integrity protection (shown in Fig. 10). We demonstrate
this property by investigating two specic cases to determine
whether the receiving entity appropriately veries (1) the in-
tegrity of the security protected messages and (2) the sequence
number, which consists of the eight least signicant bits of the
32-bit counter value synchronized between the sending and
receiving entities. Intuitively, if the receiving entity does not
verify the integrity of the message, an adversary can spoof
any unencrypted messages. Further, if the sequence number
is not thoroughly veried, the adversary can launch a replay
attack using security-protected messages that were previously
captured from victim UE. Similar to property 1, because the
adversary does not have any cryptographic keys to generate
valid messages, they send invalid messages after establishing
a connection to the eNB. The target messages for each of
the cases constitute every possible message that should be
protected after security activation.
Example cases.An example relating to the rst case could
beNAS Uplink NAS transport, which is used for SMS within
the carriers providingSMS over NAS. If an MME does not
properly verify the integrity of this message, the adversary
can exploit it for an SMS phishing attack by spoong the
contents of theNAS Uplink NAS transportmessage. Another
example representative of the second case is anNAS PDN
disconnect request. The purpose of this message is to release
the establishedPacket Data Network (PDN) Connection; in
particular, when the user turns off their device or switches off
the data service. An adversary could send this message to the
network by pretending to be the victim UE, and the network
would accept this replayed message if it does not correctly
verify the sequence number specied in the message. This
could lead to selective denial of service of legitimate users.
3) Property 3:It conrms whether the security procedures
specied in the 3GPP standards [15], [19] can be bypassed
by malicious UE or a network. The LTE standard adopts
EPS-AKA for mutual authentication between the UE and the
network for protection of both the control and data planes.
This includes theNAS Authenticationprocedure based on
the challenge-response mechanism and theSecurity mode
commandin both theRRCandNASlayers, which are session
key agreement procedures for control plane and data plane
condentiality and integrity. Three types of approaches are
available to inspect whether these security procedures could
be bypassed. The rst is to perform a security analysis of
the cryptographic algorithms adopted in the LTE standard.
However, this situation is out of the scope of this paper.
Second, one could consider situations in which an adversary
manipulates the encryption and integrity protection algorithms
selected in theRRC/NAS Security mode commandand security
header type inNAS protected messages. This was previously
studied [20], but the authors found vulnerabilities in only one
commercial modem. The last situation involves omitting parts
of the mandatory security procedures. If the device allows this
to occur, arogue LTE networkwithout cryptographic keys for
the legitimate devices could even provide manipulated services
without condentiality and integrity protection. Despite the
possibility of these situations causing serious threats if ex-
ploited, the consequences have not yet been investigated and
publicly disclosed. Thus, we limit the scope of this security
property to validate whether the UE correctly handles situa-
tions in which a malicious LTE network omits the mandatory
security procedures such as anAuthentication requestand
aSecurity mode commandin both theRRCandNASlayers.
Example case.An example could be to disregard theNAS
Authentication requestto enable an adversary to continue
following service procedures without authentication and key
agreement, both of which are mandatory procedures [15], [19].
B. Generating test cases for each property
Although we chose the target messages for each property,
several test cases exist if we consider the inputs for all possible
eld values in each message. For example, the generation of
test cases for an invalid plainNAS Attach requestto verify
security property 1 would have to consider that it has 24
elds including an optional one and the available length in this
message could be at least 16 bytes. Obviously, testing all these
possibilities is expensive. To reduce the number of test cases,
yet carry out a sufcient number to investigate the behavior
of the target entity, LTEFuzz utilizes commercial control plane
message logs. In this regard, we collected various control plane
messages by triggering many functionalities in the baseband
chipset by sending AT commands [21]. We then used this log
to build a database in which to store all the values in the
collected logs for each eld, separated by carriers. Thus, when
the generator creates test cases for carrier A, it selects one of
the possible values marked as carrier A. When generating the
test cases to check sequence number verication (second case
in property 2), we generated all the test cases by capturing
packets on the side of the victim UE. When generating test
cases for initial plain messages (property 1) and messages with
invalid MAC (rst case in property 2), only the mandatory
elds are considered as they are security critical for correct
LTE operation. Note that when the test case message contains
the identity eld of the UE, the current identity of the UE
such as the GUTI or IMSI is included to inspect whether the
receiving entity changes the state of the victim UE.
C. Classifying problematic behavior
When each case is tested, LTEFuzz has to identify which of
these cause problematic behavior in the receiving entity. This
5
Accepted by the
receiving entity?
Cause
de-registration?
Cause
de-registration?
YesNo or unknown
Yes YesNo No or unknown
Case 1. Problematic Case 2. Problematic Case 3. ProblematicCase 4. Benign
Denial of Service Message spoofing Denial of Service
Target protocol: RRC or NAS
Victim’s state: Conn. or Idle
Direction: UL or DL
…
Test case Fig. 4. Decision tree based logic for classifying problematic behavior
can easily be achieved if the operation logs of the receiving en-
tity are available to monitor. However, obtaining the operation
logs of cellular networks is not possible for researchers without
support from carriers or equipment vendors. To overcome
this limitation, LTEFuzz classies problematic behavior by
monitoring only the logs in the UE based on a simple decision
tree as shown in Fig. 4. This logic has two decision phases:
(1) whether the test case (invalid message) is accepted, and (2)
whether the test case causes disconnection of the victim UE.
For the rst decision phase, we dene the expected response
when the receiving entity accepts each test case based on the
3GPP standard. Then, LTEFuzz checks whether the expected
response is received by the UE when each test case is sent. For
instance, if a test case is an invalidNAS Identity request, the
expected response should be anNAS Identity responsewith
the desired message contents. Once this expected response
is received, LTEFuzz considers the test case to be accepted
and classies the test case as being abnormal because a test
case with invalid input should not be accepted. At the second
decision phase, it further examines whether the victim UE is
disconnected from the network in response to a test case. If
yes, it is classied as problematic, which can result in denial
of service to the victim UE (case 1). If no or unknown, it
is also classied as problematic because this behavior could
be exploited to conduct a spoong attack (case 2). When
the test case is not accepted in the rst phase, the result is
divided into two different cases in the second phase. If the
victim UE is disconnected from the network although the
test case is not accepted in the receiving entity, it is also
classied as problematic behavior, which might be rooted in
misbehavior of the receiving entity when it recognizes that
the received message is not valid (case 3). Otherwise, the test
case is classied as benign, which means the receiving entity
correctly handled the invalid message (case 4). Based on this
classication, we can easily identify the problems and even
obtain attack scenarios. For example, the crafted messages
classied as case 1 and 3 can be exploited by an adversary
to perform a DoS attack against the victim UE.
D. Ethical considerations
Testing against operational networks.The purpose of our
study was not to identify failures causing crashes or memory
leaks. Instead, we focused on nding semantic failures in LTE
operations. To this end, we generated all possible test cases
that would have been correctly parsed in the receiving entities
as the eld values are created based on the control plane logs
from the operational networks. For instance, our test cases for
carrier A are only created using the eld values found in the
control plane messages of this carrier. In addition, we only
carried out the tests against our subscribed mobile phone to
ensure that the tests did not affect the connection state of other
legitimate users. It might only change the state of our target
device into an unexpected one if our test cases are accepted
by the receiving entity. Control plane overhead was negligible
considering the overhead of a normal situation [22]. The only
test case that may affect other UEs in the victim cell was
conducted by 1) rst testing against a femtocell utilizing the
frequency bands that are not used in operational networks, and
2) testing on the testbed of the carrier.
Testing against commercial phones.A testbed operating in
an LTE licensed band might inuence legitimate users who
are not participating in our experiments. To prevent normal
users from connecting to our testbed network, we only utilized
frequency bands that are not used by operational networks.
In addition, we set the transmission power of our eNB to a
minimum such that only our target UE within a distance of 20
cm was connected to our testbed. As a result, we conrmed that
no legitimate users were attempted to connect to our testbed
network during the experiments.
Legal restriction.Many countries have legal restrictions that
forbid unauthorized signals to be sent to commercial network
systems for the purpose of disrupting their stable operation.
Thus, dynamic testing of a commercial LTE network is also
strictly prohibited without permission. Fortunately, for the
purpose of inspecting and validating the vulnerabilities we un-
covered, two carriers gave us a permission to conduct dynamic
security testing. In addition, similar to carefully generating
the test cases to avoid disrupting the normal LTE services,
we also conrmed that our test cases were not problematic in
terms of the availability and reliability of network components
by cooperating with the carriers. After conducting the tests,
we also responsibly disclosed our ndings to the carriers and
vendors to address any problems immediately. With regard
to vulnerabilities attributed to specication defects, we are
planning to contact the standard bodies soon.
IV. IMPLEMENTATION
Although we explained above that we reduced the number
of test cases, manually conducting this number of test cases
is time-consuming; furthermore, a manual approach might
increase the possibility of introducing mistakes that could
affect the consistency and reliability of the experiments. To this
end, we tried to automate test operations as much as possible
with the help of fully controllable open source LTE stacks [9],
[10] and a control plane logging tool known as SCAT [23].
The experimental setup and implementation of LTEFuzz to
execute the test cases are divided into two types: 1) inspecting
operational network components for uplink test cases, and 2)
inspecting commercial mobile devices for downlink test cases.
1) Inspecting operational networks.In this setup, the tester
acts as malicious UE and sends a crafted message with the
test case input to a target operational network. The tester is
implemented on open source standard UE stack known as
srsLTE [9]. To conrm whether each test case is executed or
triggers a failure on the network side, we utilized a decision
tree to classify the problematic case by only monitoring the
logs on the UE side as described in III-C. To this end, our
tester sends test case messages by pretending to be a victim
UE by spoong the identity of the victim UE in both the
6
RRCandNASlayers
3
. Then, we observed the behavior of the
victim UE by utilizing SCAT whenever our tester executed
a test case. We automated this procedure by establishing a
communication channel between the tester and the victim UE.
ÀWhen the victim UE is ready, the tester executes a test case
and sends a notication to the victim UE.ÁUpon receiving
the notication, the victim UE sends ping requests to a public
website (i.e., www.google.com) and checks the ping response.
If it isNetwork is unreachable, the test case is labeled as
Caused de-registration.ÂLastly, we analyze the logs on the
UE side and classify each test case based on our decision tree.
Fig. 11 in the Appendix shows an actual screenshot of running
our uplink test. We carried out uplink tests by considering the
following three cases to validate the effectiveness of each test
case. A victim and a tester are located in (1) the samecell,
(2) differentcellsbut in the sameeNB, and (3) differenteNBs
but in the sameMMEpool.
2) Inspecting commercial mobile devices.Unlike the above
setups, the experimental setup for commercial mobile devices
is simpler. In this case, the tester acts as arogue LTE network
implemented on top of openLTE [10] and the victim UE is
connected to the host PC to capture the control plane logs.
The automated test operation is as follows.ÀOnce a test case
is submitted as input to therogue LTE network, it waits until
the victim tries to connect to our network.ÁWhen the victim
sends anRRC Connection request, ourrogue LTE network
operates as specied in the test case and noties the victim
side that the test has been executed.ÂUpon receiving the
notication, the victim side saves the control plane messages.
In addition, in case the victim falls into an invalid state from
which it cannot recover to the normal state, the host PC forces
the victim UE to reboot by sending an Android Debug Bridge
(ADB) command [24].
Our implementation consists of 3,470 lines of code (LoCs)
identied via in-depth analysis of more than 90K lines in 537
les of open source tools [9], [10], [23]. This includes 1,937
LoCs of C++ for the test input generator, 1,390 LoCs of C++
for the uplink/downlink tester and 143 LoCs of Python for the
communication channel between the tester and the victim UE.
V. TESTRESULTS
We carefully conducted a dynamic test on two Tier-1
carrier networks (with three different MMEs and three eNBs)
and commercial UEs (by including three different baseband
vendors). The test results for each test case (Table IV in the
Appendix) indicate that we uncovered 51 vulnerabilities across
different target network components and device vendors. We
conrmed the validity of most of our ndings in the operational
network by interviewing counterparts from the carriers. For
clarity purposes, we explain the results of our ndings and
their root cause analysis by categorizing them into ve types.
A. Initial RRC procedure is not protected
Test case observation.The test on property 1 in theRRC
layer indicated that theRRC Connectionprocedure is neither
encrypted nor integrity protected; thus, all the messages that
belong to theRRC Connectionprocedure are classied as
case 1 or 2 as listed in Table IV. Therefore, an adversary
3
Detailed spoong techniques for each case are presented in Section V.
could exploit these messages to spoof the contents or deny
the connection of the victim UE during theRRC Connection
procedure. For example, if an adversary changed the contents
of theueIdentityeld in theRRC Connection requestto vic-
tim's S-TMSI, she could deceive the eNB and lead it to believe
that the victim UE is currently in theRRC CONNECTEDstate
despite the victim being in theRRC IDLEstate.
Root cause analysis.According to 3GPP standards [19], the
initial authenticationprocedure between the UE and MME
occurs via theNAS protocol, which is processed after the
RRC Connectionprocedure. Thus, any eNB rst allows the
UE'sRRC Connection requestand leaves the authentication
procedure to an MME. When the authentication procedure fails
due to an invalid response from the UE (e.g., in the case of
an unsubscribed user or illegal UE), the MME sends aUE
Context release requestmessage to the eNB to release the
existingRRC Connectionof the abnormal user. Therefore, by
design, even illegal users who are not legitimately subscribed
to a particular carrier would be able to connect to the eNBs
of this carrier. However, they would be unable to maintain
theRRC Connectionlonger than several seconds because their
device would be unable to respond to theNAS Authentication
requestcorrectly. Despite this limitation, we determined that
an adversary who only has the ability to connect to an
eNB (but cannot proceed with the connection to achieve
full registration), could still perform critical attacks such as
blocking anyRRC Connectionsto a target eNB (Section VI-A),
disconnecting currentRRC Connections(Section VI-B), and
blocking a target user's incoming services (Section VI-B).
These attacks are mainly rooted from the 3GPP standard such
that the initialRRC Connectionprocedure is unprotected and
can be abused by an adversary. Detailed descriptions of each
type of attack are presented in Section VI.
B. Invalid uplink NAS plain messages cause failures
Test case observation.As explained in Section IV, we carried
out the uplink tests for three different cases: A victim UE and
a tester UE
4
are located in (1) the samecell, (2) different
cellsbut in the sameeNB, and (3) differenteNBsbut in the
sameMMEpool. Note that tests relating to these cases are
also described in Section V-C and V-D. The results indicated
that an adversary could send invalid plain requests through an
RRC Connectionspoofed as the victim UE. Interestingly, three
MME types have different problematic behavior upon receiv-
ing our invalid plain requests. For example, when the tester
sends a crafted plainNAS Attach requestto the MME1and
MME3, they removed the connection of the victim UE and sent
a release command to the tester, thereby implicitly detaching
the victim UE from the network (case 3). In this case, the
victim UE does not receive notication of its disconnection
from the service unless it initiates the transmission of uplink
data by sending aNAS Service request. When the victim UE
receivesService rejectwith the causeImplicitly detached, it
has to proceed with an initialAttachprocedure to reconnect to
the LTE network and this results in several seconds of service
disconnection. For another de-registration case, upon receiving
the plainNAS Detach request, all three MMEs immediately
de-registered the victim UE and repliedNAS Detach accept
to the tester UE (case 1). Besides, we also conrmed that
4
Tester could be a UE or a network as explained in Section IV.
7
TABLE II. SUMMARY OFMAJORFINDINGS
PropertyVulnerability/Attack Implications Detection Root cause
P1
RRC Connection manipulation Connection resource depletion on eNB/Cell Case 2 Design aw
RRC connection spoong
(Blindly) Denial of incoming service when a UE is in IDLE
Case 1
Design aw
Disconnection of current radio connection when a UE is in CONNECTED Implementation aw
Improper handling of uplink Implicit de-registration of a UE
Case 1, 2, 3Implementation aw
plain NAS messages SMS phishing due to non-security protection
P2
Improper handling of Implicit de-registration of a UE
Case 1, 2, 3Implementation aw
incorrectly integrity protected SMS phishing due to non-integrity verication
NAS messages Content manipulation for security protected messages
Improper handling of
replayed NAS messages
Implicit de-registration of a UE
SMS phishing due to non-replay protection
Deactivation of selected service (e.g., data or voice)
Fake location update of a UE
P3 Bypass RRC Security mode commandEavesdropping & manipulation of user data Case 2 Implementation aw
MME2processed plainNAS Uplink NAS transportwithout
any protection (case 2). In this case, an adversary could exploit
this MME2to launch an SMS phishing attack to any users
without being charged if they are subscribed to any carriers that
have a roaming agreement with the aforementioned vulnerable
carrier. In Table III, the affected plain initial messages are
identied by(P).
Root cause analysis.According to the 3GPP standard, the UE
sends initial requests without security protection only when
it has no valid security context as in certain cases such as
an expired context timer or unexpected errors. In case the
UE has no valid security context (i.e., a session key for
encryption and integrity protection), the MME needs to create
a new valid security context for further steps to achieve full
registration. The rst step toward creating a victim's new valid
security context is anAuthenticationprocedure between the
UE and the MME. Therefore, upon receiving the spoofed
initial requests without protection from our tester (acting as
a malicious UE), the MME would be required to perform
anNAS Authenticationprocedure to conrm whether this
abnormal message originated from a legitimate user without
processing the message or immediately disconnecting existing
UE connections. Accordingly, as we assume that the adversary
UE has no valid security context, it cannot perform theAuthen-
ticationprocedure correctly, whereby, an existing connection
for legitimate UE would not be affected. Therefore, if this was
implemented correctly in MME, the victim UE should not have
been implicitly detached from the network, as observed in our
test case. In conclusion, we found that all three MMEs did not
handle invalid plain requests correctly.
C. Non-integrity checking makes spoong attack possible
Test case observation.For the validation of the rst case
in property 2, our tester generated security protectedNAS
messageswith an incorrect MAC and sent them to either
the MME or the UE to inspect whether they appropriately
verify the MAC. Accordingly, we observed three different
kinds of inappropriate behavior (case 1, 2 and 3) in different
MMEs upon receiving a message with an invalid MAC. The
MME that belongs to case 1 and 2, did not verify the MAC,
and simply accepted the invalid message. For example, when
the tester sent anUplink NAS transportmessage with an
invalid MAC, the MME accepted this as being valid; hence,
the SMS is sent to the destination UE. On the other hand,
another MME that belongs to case 3 veried the MAC when
it received the message. However, the receipt of a message with
an incorrect MAC value resulted in the MME de-registering
the existing connection of the victim UE regardless of the type
of received message. In this case, theUplink NAS transport
TABLE III. EXPLOITEDNASMESSAGES IN TWO MMETYPES
Exploited Implications
NAS Messages MME1 MME2 MME3
Attach RequestDoS (P,I,R) 5 DoS (P,I,R)
TAU Request DoS (P,I,R) 5
DoS (I),
False location update (R)
Service RequestSpoong (R) 5 Spoong (R)
Uplink NAS DoS (P,I), SMS phishing
-
Transport SMS phishing (R)(P,I,R)
PDN Connectivity
DoS (I) 5 DoS, DosS (R)
Request
PDN Disconnect
DoS (I), DosS (R) 5 DosS (R)
Request
Detach RequestDoS (P,R) DoS (P,I,R)DoS (P,I,R)
DosS:Denial of selective Service,P:Plain,I:Invalid MAC,R:Replay
with incorrect MAC caused de-registration of the victim UE
and did not transmit the SMS message to the destination UE.
Messages affected by an invalid MAC are marked with(I)in
Table III. We present detailed scenarios that exploit improper
handling of messages with an invalid MAC in Section VII.
Root cause analysis.According to the 3GPP standard [15],
both the UE and the MME have to verify the integrity of
theNAS messageonce a valid security context exists between
the UE and the MME. However, we speculate that device
vendors misunderstood the acceptance ofNAS messageswith-
out integrity protection by the MME in certain exceptional
situations (e.g., when the UE sends the message before security
is activated for the initial message. In our test scenario,
because both the victim UE and the serving MME have
the valid security context, the MME should have veried
the integrity of every received message. Failed verication
should have resulted in the MME dropping or rejecting the
received message while maintaining the existing connection
of the victim UE. Therefore, these cases obviously constitute
implementation mistakes for all three MMEs.
D. Replayed messages are accepted
Test case observation.While validating the second case in
property 2, we also inspected whether the receiving entity (the
network component or the UE) veries the sequence number
to prevent a message replay attack. The results conrmed that
some craftedNAS messageswere accepted as being valid by
both the MMEs and the UEs because the tester subsequently
received expected reply messages (case 1). For instance, when
the tester sent a replayedNAS PDN disconnect requestfor
disconnecting a specied existing data bearer, the tester re-
ceived a security protectedNAS message
5
whereas the victim
UE blindly lost the connection of the data bearer (case 1).
5
We could not exactly identify this message as it is encrypted, but it is
assumed to be aNAS Deactivate EPS bearer context requestwhen consid-
ering the message length.
8
In addition, when the tester sent replayedNAS TAU request
to MME3, it repliedNAS TAU acceptto the tester, which
means that MME3falsely updated the Tracking Area (TA)
of the victim UE (case 2). However, when the tester sent the
replayedTAU requestto MME1, it immediately de-registered
the existing connection of the victim UE whereas the tester
received anRRC Connection release(case 3). The uplink
messages affected by a replay attack are marked by(R)in
Table III. For downlinkNAS messages, we conrmed that a
HiSilicon baseband accepted the replayed message, allowing
an adversary to perform a message spoong attack (case 2).
The affected messages are listed in Table IV in the Appendix.
Root cause analysis.The 3GPP standard [15] requires both
the MME and UE to support replay protection for security
protectedNAS messagesand it provides a detailed method
of replay protection for the vendors. However, the same
document requires the receiving entity to use theNASsequence
number included in the received message for eight LSBs of
the counter when verifying the integrity of the receivedNAS
message. Moreover, when the integrity verication succeeds,
the receiving entity should update its local counter with
the value of the received sequence number. In this integrity
verication method, a message replay is possible unless the 28
LSBs of the local counter is different from the counter used
when calculating the message integrity. Therefore, the integrity
verication method specied in the standard contradicts the
security requirement that the replay protection should be
supported for theNAS messages. As a result, all three MMEs
were vulnerable to replay attack at least for oneNAS message
and one of our target basebands accepted replayed messages.
E. Security procedure can be bypassed
Test case observation.In terms of property 3, we checked
three test cases: (1) skip the key agreement procedure in the
RRClayer to nullify the security context ofRRCand user data,
(2) skip the key agreement procedure in both theRRCandNAS
layer to nullify the security context of the entire control plane
and data plane, and (3) skip all the security procedures in
AKA in bothRRCandNAS. Consequently, only the rst case
succeeded for our target mobile devices. If an adversary was to
exploit this case, they would be able to spoof theRRC messages
to obtain the private information of the UE, and eavesdrop the
user's communication. The attack procedures and implications
are described in Section VIII in detail.
Root cause analysis.As noted in the specication, the security
procedure is a mandatory step for protecting the communica-
tion between the UE and the network. However, we conrmed
that some commercial devices (using a Qualcomm baseband)
do not follow the specications; thus, they allow the security
key negotiation in theRRClayer to be omitted. Therefore,
this vulnerability is rooted in the implementation aw in
commercial baseband chipsets.
F. Summary and responses from the carriers
By sending carefully crafted messages, we were able to
uncover 51 vulnerabilities in thedesignandimplementation
of UE, eNB, and MME. From the design perspective, unpro-
tected initial procedures are vulnerable to spoong attacks.
We also conrmed that the behavior of operational MMEs
and commercial devices in response to our test cases differs
across vendors and even message types within one vendor. We
reported all our ndings to the corresponding carriers. Then,
we validated and communicated all network side test cases
with the corresponding vendors together with the carriers. As
a result, we received a response from one vendor (MME3)
conrming that all the vulnerabilities we discovered are valid
and that they are preparing patches for each problematic case.
The following sections describe how our ndings can be
exploited for attacks by categorizing the target entities as eNB,
MME, and UE, in Section VI, VII, and VIII, respectively.
VI. ATTACKS EXPLOITING ENB
A. BTS resource depletion attack
Every commercial eNB has a maximum capacity of
active user connections based on their hardware and
software specications. The purpose of theBTS resource
depletionattack is to deplete this capacity of the activeRRC
Connections, thereby preventing other users from connecting
to the target eNB.
1) Adversary model:This attack targets a commercially
operating eNB. An adversary could obtain the connection
information of the target eNB by passively listening to the
broadcast messages similar to other normal devices.
2) Attack procedure:The adversary repeatedly performs
Random Accessand generatesRRC Connectionsin order to
increase the number of activeRRC Connectionsas depicted
in Fig. 5(a). In a normal situation, immediately after the
RRC Connectionis established, an initialNAS Connection
procedure proceeds through either anNAS Attach request
orNAS Service requestpiggybacked on anRRC Connection
completemessage. In our attack, the adversary sends the
NAS Attach requestwith an arbitrary user IMSI. Unlike
the normal procedure, once the adversary receives theNAS
Authentication request, it restartsRandom Accessto
establish a newRRC Connection. The reason the adversary
does not reply to theNAS Authentication requestfrom the
MME is to sustain the establishedRRC Connectionwhile
the MME waits for a validNAS Authentication response.
If the adversary replies with an invalidNAS Authentication
response, it causes immediateRRC Connection release. One
consideration for the attack to succeed is that the number of
newly establishedRRC Connectionshas to be greater than
the number of existingRRC Connectionsthat are released.
3) Implementation:We used one USRP B210 [25] for
the software radio transceiver, and srsUE [9] to implement
a malicious UE. To repeat theRRC Connectionprocedure
continuously with different C-RNTIs, we modied the
srsUE to restart anotherRandom Accessprocedure whenever
it receives anNAS Authentication requestrather than
replying with anNAS Authentication response. If several
RRC Connection requestsare sent with the same C-RNTI,
the eNB processes this as repeated requests for the sameRRC
Connection, which is not our adversary's goal.
4) Validation:Because attacking commercially operating
eNBs can affect legitimate users, we performed ourBTS
resource depletion attackagainst a COTS femtocell [26]
connected to our testbed EPC network implemented on
OpenAirInterface (OAI) [11]. We mainly attempted to
determine the number of fakeRRC Connectionsthat could
be established using one USRP device. This is accomplished
by verifying activeRRC Connectionsof our femtocell
9
(a) (b)
Fig. 5. Flow diagrams showing the procedure followed by attacks that exploit
eNB: (a)BTS resource depletion attack, (b)Blind DoS attack
R I F R Q Q H F W L R Q
7 L P H V
, Q L W L D O L ] D W L R Q 5 H V R X U F H '
Analysis of the LTE Control Plane
Hongil Kim
KAIST
hongilk@kaist.ac.kr
Jiho Lee
KAIST
jiholee@kaist.ac.kr
Eunkyu Lee
KAIST
ekleez@kaist.ac.kr
Yongdae Kim
KAIST
yongdaek@kaist.ac.kr
AbstractThis paper presents our extensive investigation
of the security aspects of control plane procedures based on
dynamic testing of the control components in operational Long
Term Evolution (LTE) networks. For dynamic testing in LTE
networks, we implemented a semi-automated testing tool, named
LTEFuzz, by using open-source LTE software over which the
user has full control. We systematically generated test cases by
dening three basic security properties by closely analyzing the
standards. Based on the security property, LTEFuzz generates
and sends the test cases to a target network, and classies the
problematic behavior by only monitoring the device-side logs.
Accordingly, we uncovered 36 vulnerabilities, which have not
been disclosed previously. These ndings are categorized into ve
types: Improper handling of (1) unprotected initial procedure,
(2) crafted plain requests, (3) messages with invalid integrity
protection, (4) replayed messages, and (5) security procedure
bypass. We conrmed those vulnerabilities by demonstrating
proof-of-concept attacks against operational LTE networks. The
impact of the attacks is to either deny LTE services to legitimate
users, spoof SMS messages, or eavesdrop/manipulate user data
trafc. Precise root cause analysis and potential countermeasures
to address these problems are presented as well. Cellular carriers
were partially involved to maintain ethical standards as well as
verify our ndings in commercial LTE networks.
I. INTRODUCTION
Long Term Evolution (LTE) is the most advanced telecom-
munication technology thus far. It not only provides faster data
transmission with low latency but also ensures high reliability
and robustness against unexpected failures compared to older
generation networks such as Global System for Mobile com-
munication (GSM), and Universal Mobile Telecommunication
System (UMTS). Mobile network operators are aggressively
deploying LTE infrastructure; as of 2018, 600 carriers in 200
countries have deployed LTE networks, having more than 3.2
billion subscribers worldwide [1], [2].
In addition to facilitating traditional telecommunication ser-
vices such as data and voice call, LTE is considered a key en-
abler for providing always-on mobile connectivity in both the
emerging industries (e.g., autonomous vehicles and the Internet
of Things) and nation-wide communication infrastructure (e.g.,
Public Safety LTE and LTE-R for railway communication).
Typically, these applications are safety-critical and require high
availability and robustness. This means that users could face
a signicant threat to their safety if these applications were to
malfunction by the accidental disconnection of LTE services.
It is therefore pivotal to investigate the potential threats to the
LTE service procedures that can cause unexpected failures as
a result of accidents or adversaries.
The 3rd Generation Partnership Project (3GPP), a de facto
standard for LTE, denes the behavior of all network compo-
nents including security features, which have been signicantly
improved compared to earlier networks (e.g., stronger encryp-
tion and integrity protection algorithms, mandatory use of
integrity protection in control plane protocols) [3]. Moreover, it
provides conformance test suites for commercial LTE chipsets
to ensure compliance with the specication.
In spite of these efforts to eliminate the risks of unexpected
errors, recent studies have uncovered various security vulner-
abilities in the control plane procedures of LTE networks. For
example, an active adversary can relay an LTE communication
between a mobile device and a network to hijack the location
of the device [4] or redirect the DNS request of the device [5].
Attacks using rogue base stations can either track the location
of a user device or deny the LTE service by exploiting
both device side design aws and implementation bugs [6]
[8]. However, none of these studies focused on analyzing
network-side problems in operational LTE networks although
vulnerabilities of this nature can inuence a number of their
subscribers once exploited.
Motivated by the fact that the control plane components
in LTE are still under-explored, we investigated potential
problems of the control plane procedures in operational LTE
networks by dynamically analyzing the core network responses
resulting from carefully crafted malicious inputs. In general,
dynamically testing network behavior is challenging because:
¶Exploiting the control plane protocols with a commercial
smartphone is quite difcult. This is because commercial
devices implement the control plane protocols on a baseband
chipset, from which generation of arbitrary messages is dif-
cult.·The deployed carrier networks are closed systems.
Their congurations are proprietary and the control plane logs
are unavailable to devices. Thus, it is difcult to correctly
determine the root causes of the identied problems on the
device side.¸Transmitting signals to an operational network
using an uncertied device may not be allowed depending on
the regulations for carriers and countries.
We overcome these challenges by utilizing open source
LTE implementations [9][11] for testing purposes. To this
end, we implemented a semi-automated testing tool, named
LTEFuzz, by using fully controllable LTE open source soft-
ware, which 1) dynamically generates and sends the test cases
to a target network or a device [9], and further, 2) classies
problematic behavior by only inspecting the responses in the
tester and victim device from the target. Second, we collab-
orated with carriers to avoid ethical issues. For each of the
critical test cases, we interviewed carriers to establish whether
it would interfere with the LTE network. Suspicious cases that
could interfere with other users were handled independently.
Regarding the regulations on using licensed bands, our tester
device acts as if it were a single LTE device and executes
test messages individually. Therefore, nearby legitimate users
do not experience any interference, performance degradation,
and failure of their LTE services. In addition, we sent spoofed
messages by using the identity of our LTE phone. Thus, only
our phone might experience the intended failure in case our
test case is accepted by the target networks. Lastly, we reason
out the root causes based on 1) a review of 3GPP standards
and 2) interview with the carriers to conrm our ndings.
To generate the test cases systematically, we rst cre-
ated three security properties by extensively analyzing the
correct behavior of network components and their security
requirements mandated in the 3GPP specications. Using these
security properties, we determined the scope of the target
messages and generated rules for specic test cases. Then,
the test case generator mutated the random inputs among the
datasets of the control plane logs of a commercial network,
which we collected globally for approximately one year. The
reason for only considering the inputs in the commercial
logs is to prevent unexpected crashes in the receiving nodes
due to parsing errors. Total test cases cover 13 messages for
inspecting the behavior of network nodes and 29 messages for
inspecting the behavior of commercial devices.
By conducting tests against the operational network, we
found 51 vulnerabilities (36 new and 15 previously known),
which are mainly caused by the improper handling ofÀ
unprotected initial procedures,Ácrafted plain requests,Â
messages with invalid integrity protection,Ãreplayed mes-
sages, andÄsecurity procedure bypass. We also demonstrate
all the attacks by exploiting the vulnerabilities we found in
the operational network while strictly following the ethics. Our
attacks can¶deny various LTE services to either a target user
or arbitrary users,·spoof control plane messages for privacy
leaks,¸send spoofed Short Message Service (SMS), and¹
eavesdrop and manipulate data communication. A complete
list of vulnerabilities is given in the Table IV in the Appendix.
To summarize, our contributions are as follows:
We propose a systematic approach to expose vulnerabilities
in the control plane procedures of LTE networks. Our method
can examine various security aspects in several control plane
protocols by simply creating concrete security properties and
test cases.
To the best of our knowledge, we are the rst to analyze the
security problems caused by incorrect behavior in the control
plane nodes in commercial networks such asRadio Resource
Control (RRC)andNon Access Stratum (NAS)by executing
crafted uplink test cases in both theRRCand theNASlayer.
We demonstrated that most of our ndings are exploitable
by an adversary who would be able to launch critical attacks
such as the denial of LTE services, spoong of both control
and data plane messages, eavesdropping user data trafc, and
conducting phishing attacks on legitimate users.
The remainder of the paper is organized as follows. Sec-
tion II presents an overview of LTE technology with the
network architecture and key control plane procedures. In4G Core Network
S-GW
HSS
MME Billing
Domain
Internet
IMS
4G Access Network
eNB
P-GW
Tracking
Area
Cell
UE
Fig. 1. LTE network architecture
Section III, we introduce our approach to systematically nd
existing vulnerabilities in commercial network environments.
Section IV provides a detailed implementation and experimen-
tal setup of our proposed approach. We present the results of
our test and root cause analysis of each nding in Section V.
The attacks that exploit the identied vulnerabilities are pre-
sented in Sections VI, VII, and VIII. Section IX discusses
potential countermeasures and Section X presents related work.
We conclude our paper and present future work in Section XI.
II. BACKGROUND
This section presents the basic concepts of standard LTE
technology along with network architecture and essential con-
trol plane procedures [12][19].
A. LTE network architecture
Fig. 1 illustrates the LTE network architecture, which
consists of User Equipment (UE), evolved Node B (eNB), and
Evolved Packet Core (EPC) components.
UErefers to a mobile device, which can provide a legitimate
user with subscribed services such as data and voice call by
connecting to a base station. The UE is uniquely identied by
an International Mobile Station Equipment Identity (IMEI).
One distinctive feature of the UE is the use of a Universal
Subscriber Identity Module (USIM), a smart card that can be
physically inserted into the UE, which includes the subscriber
identier known as the International Mobile Subscriber Iden-
tity (IMSI), cryptographic keys, and algorithms.
AneNBis the Base Transceiver Station (BTS) in LTE, which
enables the UE to establish a wireless connection to the LTE
network. A typical eNB has a Baseband Unit (BBU) that
is responsible for processing the baseband signals, and it is
connected to multiple Remote Radio Units (RRUs), which
directly process the transmission and reception of RF signals.
Each RRU covers a sector (also known as a cell), thus, one
eNB can cover multiple cell sites as shown in Fig. 1
1
. The
eNB is connected to a Mobility Management Entity (MME)
for control-plane communication and 4G Gateways (GWs) for
both control-plane and user-plane data transmission.
TheMMEis the key control-node in the LTE network. It
authenticates the UE and manages the mobility status of
subscribers and Evolved Packet System (EPS) bearers. The
cryptographic keys for authenticating and protecting the UE
are contained in the Home Subscriber Server (HSS). The
MME performs UE authentication through an authentication
protocol known as Evolved Packet System-Authentication and
Key Agreement (EPS-AKA) with the key information received
from the HSS. The MME is also involved in the activa-
tion/deactivation process of the EPS bearer, a logical tunnel
1
The number of cells in one eNB can range from 1 to 256 in the specication
and, in practice, this depends on the operators' cell planning.
2
RRC
Radio setup
1
RRC Connection request
RRC Connection setup
NAS Authentication request/response
NAS Attach accept/complete
NAS Security mode command/complete
RRC Security mode command/complete
RRC Connection complete +NAS Attach request
(Random or UE’s S-TMSI)
(UE’s IMSI, GUTI or IMEI)
Authentication vector
Encryption/Integrity algorithm: EEAx/EIAx
RRC Connection reconf.
6
5
Signaling/Data radio bearerNew GUTI or reuse old GUTI
RRC
NAS
NAS
S1AP
S1APMME
eNB UE
+
2 3 4 78 Fig. 2. UE attach procedure with our target control plane protocol stack
created during a session between the UE and GW to service
the Internet connection. Thus, it manages user network access
by setting up and terminating the session. User mobility is
managed by tracking each user's states, stored in the MME
(e.g., whether the UE is attached to the network) and it tracks
the location of the UE in cell units. These cells are grouped
into a Tracking Area (TA).
4G GWsconsist of two types of LTE gateways: a Serving
Gateway (S-GW) and a PDN Gateway (P-GW). These GWs
ensure mobility of the UE and provide Internet service. The
S-GW becomes an anchor point when the UE moves from one
base station to another, which is known as handover, and the
P-GW allocates the IP addresses and manages the accounting
data of the UE. It also connects the UE to the Internet.
B. LTE service procedures
1) UE attach procedure:The initial procedure whereby the
UE attaches to the network (as shown in Fig. 2) is related with
both connecting the RAN (eNB) and the EPC network (MME).
The UE has to establish a radio connection with the eNB rst,
after which it attaches to the EPC network for a full connection
to the Internet through the LTE network.
Connection between the UE and eNB.When the UE is turned
on, it rst nds a suitable cell by listening to broadcasting mes-
sages from nearby base stations according to the settings (e.g.,
operator specic codes, LTE bands, and channels) congured
in the USIM card and the device modem. Once the UE nds a
suitable cell, (1) it initiates the Random Access (RA) procedure
to obtain uplink resource allocation and timing information.
Then, it saves the assigned identity known as a Temporary Cell
Radio Network Temporary Identier (Temporary C-RNTI)
from the selected cell. With this Temporary C-RNTI and the
uplink assignments, (2) the UE attempts to establish aRadio
Resource Control (RRC) Connectionby transmitting anRRC
Connection request. (3) On receiving the request, the eNB
replies with theRRC Connection setupincluding information
about the dedicated radio resource allocation and the C-RNTI
value to be used to distinguish the UE for subsequent radio
communication. (4) Lastly, the UE completes the connection
setup by sending anRRC Connection setup completemes-
sage to the cell. Once all these steps have been performed,
the UE is synchronized with the cell in both the uplink and
downlink. In addition, both the UE and eNB change their
RRCstate fromIDLEtoCONNECTEDas dened in the
3GPP standard [19]. In theRRC CONNECTEDstate, the UE
communicates with the connected cell using theRRCprotocol
for control-plane procedures. In Section V-A, we show that
no security measures are typically adopted in these initial
procedures, thereby causing serious problems in target eNBs.
Connection between UE and MME.Once the UE is success-
fully connected to a nearby eNB, it has to attach to the EPC
network to obtain LTE services. First, (4) the UE piggybacks
theNAS Attach requestto theRRC Connection completeand
sends it to an MME. Upon receiving this message, (5) the
MME starts the Authentication and Key Agreement (AKA)
procedure by replying to theNAS Authentication request
from the UE with anAuthentication vectorgenerated from the
HSS. The UE then authenticates the MME through the contents
in theNAS Authentication requestand replies by sending
anNAS Authentication responseto the MME. At this stage,
both the UE and the MME are mutually authenticated. Next, in
terms of key agreement, (6) the MME selects the encryption
and integrity protection algorithms to use, and sends aNAS
Security mode commandto the UE to inform it about the
selected algorithms. Upon the receipt of this message, the
UE generates security keys for theNASlayer. Likewise,
(7) the eNB proceedsRRC Security mode commandto inform
the security algorithms forRRClayer and user plane data
security. After these steps, all the control plane messages
that should be protected according to the standards [15], [19]
are encrypted and integrity protected using the negotiated
security algorithms. Lastly, after optional congurations are
exchanged in theNASandRRClayer, (8) the MME allocates
a Globally Unique Temporary Identity (GUTI)
2
to substitute
the permanent identity (IMSI in LTE) and sends the GUTI
and other connection information by transmitting anAttach
acceptto the UE. The attach procedure is nally completed
when the UE sends anAttach completemessage to the MME.
2) UE mobility management:As shown in Fig. 1, each
MME manages its own Tracking Areas (TAs), each of which
is identied by a Tracking Area Code (TAC). Each TA contains
several eNBs, which operate several cells to efciently cover
the geographical regions with no signal interference according
to the operating policy of the carrier. Upon arrival of an
incoming service request to a specic UE, the MME rst
checks whether the UE isRRC CONNECTEDorRRC IDLE. If
the UE is in theRRC IDLEstate, the MME has to wake up the
UE to make theRRC Connectionand the other radio bearers
of data trafc. This procedure is known asPagingin LTE
terminology. As the MME only has information about the TA
that previously served the UE, thePagingmessage is broadcast
to all the eNBs in that TA. If the UE is not found in the
particular TA, the MME can broadcast thePagingto the other
TAs. Note that the specicPagingpolicy to nd UEs might
be different across carriers depending on the relative priority
allocated to QoS, the signaling load, and other operating issues.
III. THEPROPOSEDAPPROACH
This section presents LTEFuzz, the proposed approach
to systematically conduct dynamic security analysis in op-
erational LTE networks in a semi-automated way. LTEFuzz
consists of three main steps (as shown in Fig. 3):
(1) Extracting security properties:First, we extensively
analyze the LTE standards of the control plane procedures by
2
The GUTI value consists of MME group id and S-TMSI.
3
2.Generating
& Executing test cases
3.Classifying
problematic behavior and construct attack scenar ios
eNB
Operational LTE network
MME
Commercial devices
Tester
Decision tree
Case 1 Case 2 Case 4Case 3
Attack scenario 1 Attack scenario 2 Attack scenario 3
Problematic
behavior
Test results
(UE side logs)
Test case
Properties
Commercial logs
Test cases
P1
P2
P3
Key agreement
Authentication
Invalid Seq
Plain by
adversary
Plain by
design Invalid MAC
1.Extracting
security pro
perties Fig. 3. Overview of LTEFuzz
focusing on the security aspects. Based on the analysis, we
create three security properties the network and the mobile
devices need to follow to ensure they are protected against
unknown security threats.
(2) Generating test cases:Next, we generate test cases to
identify situations in which the target control plane component
violates the security properties. The test cases are generated
based on the specied rules of target protocol messages and
its elds for each property.
(3) Classifying problematic behavior:When executing the
test cases, we need to determine which responses and state
changes on the side of the UE are considered as problematic
behavior. To this end, we build a simple decision tree logic
to classify the problematic cases. Our model only considers
the control plane logs and states on the UE side when the test
case is executed. This model, therefore, enables LTEFuzz to
identify problematic cases in an automatic way.
The remainder of this section considers each of these steps.
A. Extracting security properties from standards
A thorough analysis of the specications regarding the
control plane procedures and security requirements enabled
us to identify potential security holes that might cause the
condentiality and integrity protection of control plane pro-
cedures be circumvented depending on the implementation
and conguration policies of carriers. First, initial procedures
before establishing a security context might be exploited by
adversaries who are able to eavesdrop and manipulate LTE sig-
nals. Second, quite a few exceptional situations exist in which
the receiving entity would accept the received control plane
message without integrity protection (Section 4.4.4 in [15]
and Appendix 6 in [19]). Third, although the specication
adopts counters for the control plane protocol (such as NAS
and RRC), it species the use of a sequence number (partial
bits of the counter) in the received message when verifying the
message integrity. Therefore, message replay might be allowed.
From these observations, we created the three basic security
properties listed in Table I, each of which focuses on the ability
of the responsible entities to correctly respond to malicious
behavior by an adversary. We assume that the adversary has
minimal privilege: the adversary neither owns valid keys to
register with the LTE network nor do they have information
about other legitimate users' keys. In addition, as each property
focuses on different security aspects (i.e., incorrect handling of
unprotected procedures, invalid security protected messages,
and mandatory AKA procedures), the test scenarios and the
rules of selecting target messages vary from one property to
another. Note that, when considering the security properties,
we only targeted theNASand theRRCprotocol among the
various control plane protocols because (1) these protocols
are used to perform critical control plane procedures between
the UE and the network (e.g., UE attach procedure, mobility
management, and authentication), (2) we were able to capture
and analyze these procedures at the UE, and (3) the identied
vulnerabilities in these protocols directly affect both the UE
and the network.
Each of these properties is explained in more detail below.
1) Property 1:It conrms whether the receiving entity (the
eNB or MME for an uplink and the UE for a downlink)
appropriately handles unexpected inputs when an adversary
sends crafted plain messages during the initial procedures.
To validate this property, we consider two situations when
selecting the target messages: (1) crafted plain messages that
can be sent before security is activated, and (2) messages
that should not be sent unprotected after security activation
according to the standard. For the rst case, we mainly inspect
the potential threats of initial plain messages that cannot be
protected by the nature of the symmetric key cryptography of
LTE. For these unprotected messages, it is hard to distinguish
whether the received message is sent from the adversary
or a benign user. On the other hand, the purpose of the
second situation is to inspect whether the deployed cellular
components are correctly implemented to reject or discard
invalid plain messages that do not comply with the standard.
Messages transmitted after security activation usually adhere
to security critical procedures. Thus, an adversary might affect
the connection state of a UE or expose the private informa-
tion of the UE if the receiving entities incorrectly handle
these security-protected messages. Here we assume that the
adversary neither subscribes to the particular mobile phone
service nor do they have the security keys of the other UE.
Therefore, the adversary would be able to create and send
plain messages with arbitrary contents, but these messages
are not valid ones. During the test, the adversary acts as a
malicious UEwhen investigating the behavior of the eNB and
MME (uplink direction) and as arogue LTE networkwhen
investigating UE behavior (downlink direction).
Example cases.An example of a message representing the rst
situation is anRRC Connection request. Because the initial
RRC Connectionprocedure is not protected by design, an
adversary can spoof any contents while establishing theRRC
Connection. Victim eNBs without proper security measures
would accept these fabricated messages. Another example to
illustrate the second situation could be a plainNAS Attach
requestspoofed with the victim's GUTI. In normal cases,
when UE attempts to perform re-registration with their pre-
vious cryptographic key information (known as thesecurity
contextin 3GPP) and GUTI, an integrity protectedNAS Attach
requestis sent. Upon receiving the message, the MME
allows UE registration without performing an AKA procedure
because the UE is already authenticated by its valid integrity
protected message. Thus, if the MME does not correctly check
whether the received message has to be security protected, an
adversary may disconnect the victim's existing connection by
sending a plainNAS Attach requestspoofed with the victim's
GUTI. A detailed analysis of the consequences of these two
situations is provided in Section V-A and V-B, respectively.
2) Property 2:It validates whether the receiver appro-
priately handles unexpected messages that are incorrectly
4
TABLE I. S ECURITY PROPERTIES FOR SYSTEMATIC SECURITY TESTING
Security property Target procedures/messages Example
P1Invalid plain messages should be properly handled
Messages that are allowed to be sent in plaintextRRC Connection request, IMSI Attach request
Messages that are not allowed to be sent in plaintextGUTI Attach request, Uplink NAS transport
P2Invalid security protected messages should be properly handled
Messages with invalid integrity protection
PDN disconnect request, Service request
Messages with invalid sequence number
P3Mandatory security procedures should not be bypassed
Mutual authentication procedure Authentication request
Key agreement procedure NAS/RRC Security mode command
encapsulated with a security header. According to the spec-
ication [15], allNASmessages after the AKA procedure
should be both encrypted and integrity protected except some
messages, such as anAttach request, aTAU request, and
aSecurity mode command, all of which are only integrity
protected. To this end, when a UE sends anNASmessage after
the AKA procedure, it encrypts the plainNASmessages rst
and then calculates the Message Authentication Code (MAC)
for integrity protection (shown in Fig. 10). We demonstrate
this property by investigating two specic cases to determine
whether the receiving entity appropriately veries (1) the in-
tegrity of the security protected messages and (2) the sequence
number, which consists of the eight least signicant bits of the
32-bit counter value synchronized between the sending and
receiving entities. Intuitively, if the receiving entity does not
verify the integrity of the message, an adversary can spoof
any unencrypted messages. Further, if the sequence number
is not thoroughly veried, the adversary can launch a replay
attack using security-protected messages that were previously
captured from victim UE. Similar to property 1, because the
adversary does not have any cryptographic keys to generate
valid messages, they send invalid messages after establishing
a connection to the eNB. The target messages for each of
the cases constitute every possible message that should be
protected after security activation.
Example cases.An example relating to the rst case could
beNAS Uplink NAS transport, which is used for SMS within
the carriers providingSMS over NAS. If an MME does not
properly verify the integrity of this message, the adversary
can exploit it for an SMS phishing attack by spoong the
contents of theNAS Uplink NAS transportmessage. Another
example representative of the second case is anNAS PDN
disconnect request. The purpose of this message is to release
the establishedPacket Data Network (PDN) Connection; in
particular, when the user turns off their device or switches off
the data service. An adversary could send this message to the
network by pretending to be the victim UE, and the network
would accept this replayed message if it does not correctly
verify the sequence number specied in the message. This
could lead to selective denial of service of legitimate users.
3) Property 3:It conrms whether the security procedures
specied in the 3GPP standards [15], [19] can be bypassed
by malicious UE or a network. The LTE standard adopts
EPS-AKA for mutual authentication between the UE and the
network for protection of both the control and data planes.
This includes theNAS Authenticationprocedure based on
the challenge-response mechanism and theSecurity mode
commandin both theRRCandNASlayers, which are session
key agreement procedures for control plane and data plane
condentiality and integrity. Three types of approaches are
available to inspect whether these security procedures could
be bypassed. The rst is to perform a security analysis of
the cryptographic algorithms adopted in the LTE standard.
However, this situation is out of the scope of this paper.
Second, one could consider situations in which an adversary
manipulates the encryption and integrity protection algorithms
selected in theRRC/NAS Security mode commandand security
header type inNAS protected messages. This was previously
studied [20], but the authors found vulnerabilities in only one
commercial modem. The last situation involves omitting parts
of the mandatory security procedures. If the device allows this
to occur, arogue LTE networkwithout cryptographic keys for
the legitimate devices could even provide manipulated services
without condentiality and integrity protection. Despite the
possibility of these situations causing serious threats if ex-
ploited, the consequences have not yet been investigated and
publicly disclosed. Thus, we limit the scope of this security
property to validate whether the UE correctly handles situa-
tions in which a malicious LTE network omits the mandatory
security procedures such as anAuthentication requestand
aSecurity mode commandin both theRRCandNASlayers.
Example case.An example could be to disregard theNAS
Authentication requestto enable an adversary to continue
following service procedures without authentication and key
agreement, both of which are mandatory procedures [15], [19].
B. Generating test cases for each property
Although we chose the target messages for each property,
several test cases exist if we consider the inputs for all possible
eld values in each message. For example, the generation of
test cases for an invalid plainNAS Attach requestto verify
security property 1 would have to consider that it has 24
elds including an optional one and the available length in this
message could be at least 16 bytes. Obviously, testing all these
possibilities is expensive. To reduce the number of test cases,
yet carry out a sufcient number to investigate the behavior
of the target entity, LTEFuzz utilizes commercial control plane
message logs. In this regard, we collected various control plane
messages by triggering many functionalities in the baseband
chipset by sending AT commands [21]. We then used this log
to build a database in which to store all the values in the
collected logs for each eld, separated by carriers. Thus, when
the generator creates test cases for carrier A, it selects one of
the possible values marked as carrier A. When generating the
test cases to check sequence number verication (second case
in property 2), we generated all the test cases by capturing
packets on the side of the victim UE. When generating test
cases for initial plain messages (property 1) and messages with
invalid MAC (rst case in property 2), only the mandatory
elds are considered as they are security critical for correct
LTE operation. Note that when the test case message contains
the identity eld of the UE, the current identity of the UE
such as the GUTI or IMSI is included to inspect whether the
receiving entity changes the state of the victim UE.
C. Classifying problematic behavior
When each case is tested, LTEFuzz has to identify which of
these cause problematic behavior in the receiving entity. This
5
Accepted by the
receiving entity?
Cause
de-registration?
Cause
de-registration?
YesNo or unknown
Yes YesNo No or unknown
Case 1. Problematic Case 2. Problematic Case 3. ProblematicCase 4. Benign
Denial of Service Message spoofing Denial of Service
Target protocol: RRC or NAS
Victim’s state: Conn. or Idle
Direction: UL or DL
…
Test case Fig. 4. Decision tree based logic for classifying problematic behavior
can easily be achieved if the operation logs of the receiving en-
tity are available to monitor. However, obtaining the operation
logs of cellular networks is not possible for researchers without
support from carriers or equipment vendors. To overcome
this limitation, LTEFuzz classies problematic behavior by
monitoring only the logs in the UE based on a simple decision
tree as shown in Fig. 4. This logic has two decision phases:
(1) whether the test case (invalid message) is accepted, and (2)
whether the test case causes disconnection of the victim UE.
For the rst decision phase, we dene the expected response
when the receiving entity accepts each test case based on the
3GPP standard. Then, LTEFuzz checks whether the expected
response is received by the UE when each test case is sent. For
instance, if a test case is an invalidNAS Identity request, the
expected response should be anNAS Identity responsewith
the desired message contents. Once this expected response
is received, LTEFuzz considers the test case to be accepted
and classies the test case as being abnormal because a test
case with invalid input should not be accepted. At the second
decision phase, it further examines whether the victim UE is
disconnected from the network in response to a test case. If
yes, it is classied as problematic, which can result in denial
of service to the victim UE (case 1). If no or unknown, it
is also classied as problematic because this behavior could
be exploited to conduct a spoong attack (case 2). When
the test case is not accepted in the rst phase, the result is
divided into two different cases in the second phase. If the
victim UE is disconnected from the network although the
test case is not accepted in the receiving entity, it is also
classied as problematic behavior, which might be rooted in
misbehavior of the receiving entity when it recognizes that
the received message is not valid (case 3). Otherwise, the test
case is classied as benign, which means the receiving entity
correctly handled the invalid message (case 4). Based on this
classication, we can easily identify the problems and even
obtain attack scenarios. For example, the crafted messages
classied as case 1 and 3 can be exploited by an adversary
to perform a DoS attack against the victim UE.
D. Ethical considerations
Testing against operational networks.The purpose of our
study was not to identify failures causing crashes or memory
leaks. Instead, we focused on nding semantic failures in LTE
operations. To this end, we generated all possible test cases
that would have been correctly parsed in the receiving entities
as the eld values are created based on the control plane logs
from the operational networks. For instance, our test cases for
carrier A are only created using the eld values found in the
control plane messages of this carrier. In addition, we only
carried out the tests against our subscribed mobile phone to
ensure that the tests did not affect the connection state of other
legitimate users. It might only change the state of our target
device into an unexpected one if our test cases are accepted
by the receiving entity. Control plane overhead was negligible
considering the overhead of a normal situation [22]. The only
test case that may affect other UEs in the victim cell was
conducted by 1) rst testing against a femtocell utilizing the
frequency bands that are not used in operational networks, and
2) testing on the testbed of the carrier.
Testing against commercial phones.A testbed operating in
an LTE licensed band might inuence legitimate users who
are not participating in our experiments. To prevent normal
users from connecting to our testbed network, we only utilized
frequency bands that are not used by operational networks.
In addition, we set the transmission power of our eNB to a
minimum such that only our target UE within a distance of 20
cm was connected to our testbed. As a result, we conrmed that
no legitimate users were attempted to connect to our testbed
network during the experiments.
Legal restriction.Many countries have legal restrictions that
forbid unauthorized signals to be sent to commercial network
systems for the purpose of disrupting their stable operation.
Thus, dynamic testing of a commercial LTE network is also
strictly prohibited without permission. Fortunately, for the
purpose of inspecting and validating the vulnerabilities we un-
covered, two carriers gave us a permission to conduct dynamic
security testing. In addition, similar to carefully generating
the test cases to avoid disrupting the normal LTE services,
we also conrmed that our test cases were not problematic in
terms of the availability and reliability of network components
by cooperating with the carriers. After conducting the tests,
we also responsibly disclosed our ndings to the carriers and
vendors to address any problems immediately. With regard
to vulnerabilities attributed to specication defects, we are
planning to contact the standard bodies soon.
IV. IMPLEMENTATION
Although we explained above that we reduced the number
of test cases, manually conducting this number of test cases
is time-consuming; furthermore, a manual approach might
increase the possibility of introducing mistakes that could
affect the consistency and reliability of the experiments. To this
end, we tried to automate test operations as much as possible
with the help of fully controllable open source LTE stacks [9],
[10] and a control plane logging tool known as SCAT [23].
The experimental setup and implementation of LTEFuzz to
execute the test cases are divided into two types: 1) inspecting
operational network components for uplink test cases, and 2)
inspecting commercial mobile devices for downlink test cases.
1) Inspecting operational networks.In this setup, the tester
acts as malicious UE and sends a crafted message with the
test case input to a target operational network. The tester is
implemented on open source standard UE stack known as
srsLTE [9]. To conrm whether each test case is executed or
triggers a failure on the network side, we utilized a decision
tree to classify the problematic case by only monitoring the
logs on the UE side as described in III-C. To this end, our
tester sends test case messages by pretending to be a victim
UE by spoong the identity of the victim UE in both the
6
RRCandNASlayers
3
. Then, we observed the behavior of the
victim UE by utilizing SCAT whenever our tester executed
a test case. We automated this procedure by establishing a
communication channel between the tester and the victim UE.
ÀWhen the victim UE is ready, the tester executes a test case
and sends a notication to the victim UE.ÁUpon receiving
the notication, the victim UE sends ping requests to a public
website (i.e., www.google.com) and checks the ping response.
If it isNetwork is unreachable, the test case is labeled as
Caused de-registration.ÂLastly, we analyze the logs on the
UE side and classify each test case based on our decision tree.
Fig. 11 in the Appendix shows an actual screenshot of running
our uplink test. We carried out uplink tests by considering the
following three cases to validate the effectiveness of each test
case. A victim and a tester are located in (1) the samecell,
(2) differentcellsbut in the sameeNB, and (3) differenteNBs
but in the sameMMEpool.
2) Inspecting commercial mobile devices.Unlike the above
setups, the experimental setup for commercial mobile devices
is simpler. In this case, the tester acts as arogue LTE network
implemented on top of openLTE [10] and the victim UE is
connected to the host PC to capture the control plane logs.
The automated test operation is as follows.ÀOnce a test case
is submitted as input to therogue LTE network, it waits until
the victim tries to connect to our network.ÁWhen the victim
sends anRRC Connection request, ourrogue LTE network
operates as specied in the test case and noties the victim
side that the test has been executed.ÂUpon receiving the
notication, the victim side saves the control plane messages.
In addition, in case the victim falls into an invalid state from
which it cannot recover to the normal state, the host PC forces
the victim UE to reboot by sending an Android Debug Bridge
(ADB) command [24].
Our implementation consists of 3,470 lines of code (LoCs)
identied via in-depth analysis of more than 90K lines in 537
les of open source tools [9], [10], [23]. This includes 1,937
LoCs of C++ for the test input generator, 1,390 LoCs of C++
for the uplink/downlink tester and 143 LoCs of Python for the
communication channel between the tester and the victim UE.
V. TESTRESULTS
We carefully conducted a dynamic test on two Tier-1
carrier networks (with three different MMEs and three eNBs)
and commercial UEs (by including three different baseband
vendors). The test results for each test case (Table IV in the
Appendix) indicate that we uncovered 51 vulnerabilities across
different target network components and device vendors. We
conrmed the validity of most of our ndings in the operational
network by interviewing counterparts from the carriers. For
clarity purposes, we explain the results of our ndings and
their root cause analysis by categorizing them into ve types.
A. Initial RRC procedure is not protected
Test case observation.The test on property 1 in theRRC
layer indicated that theRRC Connectionprocedure is neither
encrypted nor integrity protected; thus, all the messages that
belong to theRRC Connectionprocedure are classied as
case 1 or 2 as listed in Table IV. Therefore, an adversary
3
Detailed spoong techniques for each case are presented in Section V.
could exploit these messages to spoof the contents or deny
the connection of the victim UE during theRRC Connection
procedure. For example, if an adversary changed the contents
of theueIdentityeld in theRRC Connection requestto vic-
tim's S-TMSI, she could deceive the eNB and lead it to believe
that the victim UE is currently in theRRC CONNECTEDstate
despite the victim being in theRRC IDLEstate.
Root cause analysis.According to 3GPP standards [19], the
initial authenticationprocedure between the UE and MME
occurs via theNAS protocol, which is processed after the
RRC Connectionprocedure. Thus, any eNB rst allows the
UE'sRRC Connection requestand leaves the authentication
procedure to an MME. When the authentication procedure fails
due to an invalid response from the UE (e.g., in the case of
an unsubscribed user or illegal UE), the MME sends aUE
Context release requestmessage to the eNB to release the
existingRRC Connectionof the abnormal user. Therefore, by
design, even illegal users who are not legitimately subscribed
to a particular carrier would be able to connect to the eNBs
of this carrier. However, they would be unable to maintain
theRRC Connectionlonger than several seconds because their
device would be unable to respond to theNAS Authentication
requestcorrectly. Despite this limitation, we determined that
an adversary who only has the ability to connect to an
eNB (but cannot proceed with the connection to achieve
full registration), could still perform critical attacks such as
blocking anyRRC Connectionsto a target eNB (Section VI-A),
disconnecting currentRRC Connections(Section VI-B), and
blocking a target user's incoming services (Section VI-B).
These attacks are mainly rooted from the 3GPP standard such
that the initialRRC Connectionprocedure is unprotected and
can be abused by an adversary. Detailed descriptions of each
type of attack are presented in Section VI.
B. Invalid uplink NAS plain messages cause failures
Test case observation.As explained in Section IV, we carried
out the uplink tests for three different cases: A victim UE and
a tester UE
4
are located in (1) the samecell, (2) different
cellsbut in the sameeNB, and (3) differenteNBsbut in the
sameMMEpool. Note that tests relating to these cases are
also described in Section V-C and V-D. The results indicated
that an adversary could send invalid plain requests through an
RRC Connectionspoofed as the victim UE. Interestingly, three
MME types have different problematic behavior upon receiv-
ing our invalid plain requests. For example, when the tester
sends a crafted plainNAS Attach requestto the MME1and
MME3, they removed the connection of the victim UE and sent
a release command to the tester, thereby implicitly detaching
the victim UE from the network (case 3). In this case, the
victim UE does not receive notication of its disconnection
from the service unless it initiates the transmission of uplink
data by sending aNAS Service request. When the victim UE
receivesService rejectwith the causeImplicitly detached, it
has to proceed with an initialAttachprocedure to reconnect to
the LTE network and this results in several seconds of service
disconnection. For another de-registration case, upon receiving
the plainNAS Detach request, all three MMEs immediately
de-registered the victim UE and repliedNAS Detach accept
to the tester UE (case 1). Besides, we also conrmed that
4
Tester could be a UE or a network as explained in Section IV.
7
TABLE II. SUMMARY OFMAJORFINDINGS
PropertyVulnerability/Attack Implications Detection Root cause
P1
RRC Connection manipulation Connection resource depletion on eNB/Cell Case 2 Design aw
RRC connection spoong
(Blindly) Denial of incoming service when a UE is in IDLE
Case 1
Design aw
Disconnection of current radio connection when a UE is in CONNECTED Implementation aw
Improper handling of uplink Implicit de-registration of a UE
Case 1, 2, 3Implementation aw
plain NAS messages SMS phishing due to non-security protection
P2
Improper handling of Implicit de-registration of a UE
Case 1, 2, 3Implementation aw
incorrectly integrity protected SMS phishing due to non-integrity verication
NAS messages Content manipulation for security protected messages
Improper handling of
replayed NAS messages
Implicit de-registration of a UE
SMS phishing due to non-replay protection
Deactivation of selected service (e.g., data or voice)
Fake location update of a UE
P3 Bypass RRC Security mode commandEavesdropping & manipulation of user data Case 2 Implementation aw
MME2processed plainNAS Uplink NAS transportwithout
any protection (case 2). In this case, an adversary could exploit
this MME2to launch an SMS phishing attack to any users
without being charged if they are subscribed to any carriers that
have a roaming agreement with the aforementioned vulnerable
carrier. In Table III, the affected plain initial messages are
identied by(P).
Root cause analysis.According to the 3GPP standard, the UE
sends initial requests without security protection only when
it has no valid security context as in certain cases such as
an expired context timer or unexpected errors. In case the
UE has no valid security context (i.e., a session key for
encryption and integrity protection), the MME needs to create
a new valid security context for further steps to achieve full
registration. The rst step toward creating a victim's new valid
security context is anAuthenticationprocedure between the
UE and the MME. Therefore, upon receiving the spoofed
initial requests without protection from our tester (acting as
a malicious UE), the MME would be required to perform
anNAS Authenticationprocedure to conrm whether this
abnormal message originated from a legitimate user without
processing the message or immediately disconnecting existing
UE connections. Accordingly, as we assume that the adversary
UE has no valid security context, it cannot perform theAuthen-
ticationprocedure correctly, whereby, an existing connection
for legitimate UE would not be affected. Therefore, if this was
implemented correctly in MME, the victim UE should not have
been implicitly detached from the network, as observed in our
test case. In conclusion, we found that all three MMEs did not
handle invalid plain requests correctly.
C. Non-integrity checking makes spoong attack possible
Test case observation.For the validation of the rst case
in property 2, our tester generated security protectedNAS
messageswith an incorrect MAC and sent them to either
the MME or the UE to inspect whether they appropriately
verify the MAC. Accordingly, we observed three different
kinds of inappropriate behavior (case 1, 2 and 3) in different
MMEs upon receiving a message with an invalid MAC. The
MME that belongs to case 1 and 2, did not verify the MAC,
and simply accepted the invalid message. For example, when
the tester sent anUplink NAS transportmessage with an
invalid MAC, the MME accepted this as being valid; hence,
the SMS is sent to the destination UE. On the other hand,
another MME that belongs to case 3 veried the MAC when
it received the message. However, the receipt of a message with
an incorrect MAC value resulted in the MME de-registering
the existing connection of the victim UE regardless of the type
of received message. In this case, theUplink NAS transport
TABLE III. EXPLOITEDNASMESSAGES IN TWO MMETYPES
Exploited Implications
NAS Messages MME1 MME2 MME3
Attach RequestDoS (P,I,R) 5 DoS (P,I,R)
TAU Request DoS (P,I,R) 5
DoS (I),
False location update (R)
Service RequestSpoong (R) 5 Spoong (R)
Uplink NAS DoS (P,I), SMS phishing
-
Transport SMS phishing (R)(P,I,R)
PDN Connectivity
DoS (I) 5 DoS, DosS (R)
Request
PDN Disconnect
DoS (I), DosS (R) 5 DosS (R)
Request
Detach RequestDoS (P,R) DoS (P,I,R)DoS (P,I,R)
DosS:Denial of selective Service,P:Plain,I:Invalid MAC,R:Replay
with incorrect MAC caused de-registration of the victim UE
and did not transmit the SMS message to the destination UE.
Messages affected by an invalid MAC are marked with(I)in
Table III. We present detailed scenarios that exploit improper
handling of messages with an invalid MAC in Section VII.
Root cause analysis.According to the 3GPP standard [15],
both the UE and the MME have to verify the integrity of
theNAS messageonce a valid security context exists between
the UE and the MME. However, we speculate that device
vendors misunderstood the acceptance ofNAS messageswith-
out integrity protection by the MME in certain exceptional
situations (e.g., when the UE sends the message before security
is activated for the initial message. In our test scenario,
because both the victim UE and the serving MME have
the valid security context, the MME should have veried
the integrity of every received message. Failed verication
should have resulted in the MME dropping or rejecting the
received message while maintaining the existing connection
of the victim UE. Therefore, these cases obviously constitute
implementation mistakes for all three MMEs.
D. Replayed messages are accepted
Test case observation.While validating the second case in
property 2, we also inspected whether the receiving entity (the
network component or the UE) veries the sequence number
to prevent a message replay attack. The results conrmed that
some craftedNAS messageswere accepted as being valid by
both the MMEs and the UEs because the tester subsequently
received expected reply messages (case 1). For instance, when
the tester sent a replayedNAS PDN disconnect requestfor
disconnecting a specied existing data bearer, the tester re-
ceived a security protectedNAS message
5
whereas the victim
UE blindly lost the connection of the data bearer (case 1).
5
We could not exactly identify this message as it is encrypted, but it is
assumed to be aNAS Deactivate EPS bearer context requestwhen consid-
ering the message length.
8
In addition, when the tester sent replayedNAS TAU request
to MME3, it repliedNAS TAU acceptto the tester, which
means that MME3falsely updated the Tracking Area (TA)
of the victim UE (case 2). However, when the tester sent the
replayedTAU requestto MME1, it immediately de-registered
the existing connection of the victim UE whereas the tester
received anRRC Connection release(case 3). The uplink
messages affected by a replay attack are marked by(R)in
Table III. For downlinkNAS messages, we conrmed that a
HiSilicon baseband accepted the replayed message, allowing
an adversary to perform a message spoong attack (case 2).
The affected messages are listed in Table IV in the Appendix.
Root cause analysis.The 3GPP standard [15] requires both
the MME and UE to support replay protection for security
protectedNAS messagesand it provides a detailed method
of replay protection for the vendors. However, the same
document requires the receiving entity to use theNASsequence
number included in the received message for eight LSBs of
the counter when verifying the integrity of the receivedNAS
message. Moreover, when the integrity verication succeeds,
the receiving entity should update its local counter with
the value of the received sequence number. In this integrity
verication method, a message replay is possible unless the 28
LSBs of the local counter is different from the counter used
when calculating the message integrity. Therefore, the integrity
verication method specied in the standard contradicts the
security requirement that the replay protection should be
supported for theNAS messages. As a result, all three MMEs
were vulnerable to replay attack at least for oneNAS message
and one of our target basebands accepted replayed messages.
E. Security procedure can be bypassed
Test case observation.In terms of property 3, we checked
three test cases: (1) skip the key agreement procedure in the
RRClayer to nullify the security context ofRRCand user data,
(2) skip the key agreement procedure in both theRRCandNAS
layer to nullify the security context of the entire control plane
and data plane, and (3) skip all the security procedures in
AKA in bothRRCandNAS. Consequently, only the rst case
succeeded for our target mobile devices. If an adversary was to
exploit this case, they would be able to spoof theRRC messages
to obtain the private information of the UE, and eavesdrop the
user's communication. The attack procedures and implications
are described in Section VIII in detail.
Root cause analysis.As noted in the specication, the security
procedure is a mandatory step for protecting the communica-
tion between the UE and the network. However, we conrmed
that some commercial devices (using a Qualcomm baseband)
do not follow the specications; thus, they allow the security
key negotiation in theRRClayer to be omitted. Therefore,
this vulnerability is rooted in the implementation aw in
commercial baseband chipsets.
F. Summary and responses from the carriers
By sending carefully crafted messages, we were able to
uncover 51 vulnerabilities in thedesignandimplementation
of UE, eNB, and MME. From the design perspective, unpro-
tected initial procedures are vulnerable to spoong attacks.
We also conrmed that the behavior of operational MMEs
and commercial devices in response to our test cases differs
across vendors and even message types within one vendor. We
reported all our ndings to the corresponding carriers. Then,
we validated and communicated all network side test cases
with the corresponding vendors together with the carriers. As
a result, we received a response from one vendor (MME3)
conrming that all the vulnerabilities we discovered are valid
and that they are preparing patches for each problematic case.
The following sections describe how our ndings can be
exploited for attacks by categorizing the target entities as eNB,
MME, and UE, in Section VI, VII, and VIII, respectively.
VI. ATTACKS EXPLOITING ENB
A. BTS resource depletion attack
Every commercial eNB has a maximum capacity of
active user connections based on their hardware and
software specications. The purpose of theBTS resource
depletionattack is to deplete this capacity of the activeRRC
Connections, thereby preventing other users from connecting
to the target eNB.
1) Adversary model:This attack targets a commercially
operating eNB. An adversary could obtain the connection
information of the target eNB by passively listening to the
broadcast messages similar to other normal devices.
2) Attack procedure:The adversary repeatedly performs
Random Accessand generatesRRC Connectionsin order to
increase the number of activeRRC Connectionsas depicted
in Fig. 5(a). In a normal situation, immediately after the
RRC Connectionis established, an initialNAS Connection
procedure proceeds through either anNAS Attach request
orNAS Service requestpiggybacked on anRRC Connection
completemessage. In our attack, the adversary sends the
NAS Attach requestwith an arbitrary user IMSI. Unlike
the normal procedure, once the adversary receives theNAS
Authentication request, it restartsRandom Accessto
establish a newRRC Connection. The reason the adversary
does not reply to theNAS Authentication requestfrom the
MME is to sustain the establishedRRC Connectionwhile
the MME waits for a validNAS Authentication response.
If the adversary replies with an invalidNAS Authentication
response, it causes immediateRRC Connection release. One
consideration for the attack to succeed is that the number of
newly establishedRRC Connectionshas to be greater than
the number of existingRRC Connectionsthat are released.
3) Implementation:We used one USRP B210 [25] for
the software radio transceiver, and srsUE [9] to implement
a malicious UE. To repeat theRRC Connectionprocedure
continuously with different C-RNTIs, we modied the
srsUE to restart anotherRandom Accessprocedure whenever
it receives anNAS Authentication requestrather than
replying with anNAS Authentication response. If several
RRC Connection requestsare sent with the same C-RNTI,
the eNB processes this as repeated requests for the sameRRC
Connection, which is not our adversary's goal.
4) Validation:Because attacking commercially operating
eNBs can affect legitimate users, we performed ourBTS
resource depletion attackagainst a COTS femtocell [26]
connected to our testbed EPC network implemented on
OpenAirInterface (OAI) [11]. We mainly attempted to
determine the number of fakeRRC Connectionsthat could
be established using one USRP device. This is accomplished
by verifying activeRRC Connectionsof our femtocell
9
(a) (b)
Fig. 5. Flow diagrams showing the procedure followed by attacks that exploit
eNB: (a)BTS resource depletion attack, (b)Blind DoS attack
R I F R Q Q H F W L R Q
7 L P H V
, Q L W L D O L ] D W L R Q 5 H V R X U F H '