0% found this document useful (0 votes)
84 views1 page

LTE Phone Number Catcher Attack

This document summarizes a research paper that describes a practical attack against mobile privacy called an "LTE Phone Number Catcher". The attack is able to obtain a user's phone number by taking advantage of the fact that mobile networks transmit users' phone numbers when initiating calls or SMS services, even though phones do not directly transmit their number. The attack utilizes an IMSI catcher and 2G man-in-the-middle techniques to intercept these transmissions of phone numbers from the mobile network. The paper analyzes the relevant LTE protocols and demonstrates the feasibility of the attack through real tests.

Uploaded by

Jose Campos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views1 page

LTE Phone Number Catcher Attack

This document summarizes a research paper that describes a practical attack against mobile privacy called an "LTE Phone Number Catcher". The attack is able to obtain a user's phone number by taking advantage of the fact that mobile networks transmit users' phone numbers when initiating calls or SMS services, even though phones do not directly transmit their number. The attack utilizes an IMSI catcher and 2G man-in-the-middle techniques to intercept these transmissions of phone numbers from the mobile network. The paper analyzes the relevant LTE protocols and demonstrates the feasibility of the attack through real tests.

Uploaded by

Jose Campos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Search 204,990,983 papers from all elds of science Search Sign In Create Free Account

DOI: 10.1155/2019/7425235  •  Corpus ID: 203980463

LTE Phone Number Catcher: A Practical Attack against Mobile


Privacy
Chuan Yu, Shuhui Chen, Zhiping Cai  •  Published 30 September 2019  •  Computer Science  •  Secur. Commun. Networks

Phone number is a unique identity code of a mobile subscriber, which plays a more important role in the mobile social network life than another
identi cation number IMSI. Unlike the IMSI, a mobile device never transmits its own phone number to the network side in the radio. However, the
mobile network may send a user’s phone number to another mobile terminal when this user initiating a call or SMS service. Based on the above
facts, with the help of an IMSI catcher and 2G man-in-the-middle… Expand

View PDF Save to Library Create Alert Cite

Abstract Figures 11 Citations 13 References Related Papers

Figures from this paper

Figure 1 Figure 2 Figure 3 Figure 5

View All 7 Figures & Tables

11 Citations
Search within citations Citation Type More Filters Sort by Relevance

Personal phone number privacy-preserving models for public use


Alanazi Rayan, Hamoud H. Alshammari  •  Computer Science  •  Journal of Discrete Mathematical Sciences and Cryptography  •  2021

TLDR  This paper proposes an alternative: Virtual Mobile Number Model (VMNM) that links a user’s real mobile number with a virtual mobile
number to help secure individual privacy and evaluates the model and explains how it helps to protect the user's privacy as well as prevent
personal data from being violated. Expand
View 1 excerpt, cites background Save Alert

IMSI Catchers in the wild: A real world 4G/5G assessment


I. Palamà, F. Gringoli, G. Bianchi, N. Blefari-Melazzi  •  Computer Science  •  Comput. Networks  •  2021
4  •  Save Alert

The diverse and variegated reactions of different cellular devices to IMSI catching attacks
I. Palamà, F. Gringoli, G. Bianchi, N. Blefari-Melazzi  •  Computer Science  •  WiNTECH@MOBICOM  •  2020

TLDR  Assessment of how different User Terminals react to IMSI-catching attacks, namely location privacy attacks aiming at gathering the
user's International Mobile Subscriber Identity, shows that successfulness of the attack depends only on the chipset and the SDR tool.
Expand
2 PDF  •  Save Alert

Measuring the Deployment of 5G Security Enhancement


Shiyue Nie, Yiming Zhang, T. Wan, Haixin Duan, Song Li  •  Computer Science  •  WISEC  •  2022

TLDR  5G security features and implementation in commercial 5G networks are analyzed and results show that major discrepancy exists
between 5G security standards and real world deployment, especially in the areas of UP protection and subscriber identi er protection.
Expand
Save Alert

Anomaly Detection Algorithms for Location Security in 5G Scenarios


S. Bartoletti, I. Palamà, D. Orlando, G. Bianchi, N. Blefari-Melazzi  •  Computer Science  •  ArXiv  •  2021

TLDR  This paper concretely focuses on two classes of threats: noise-like jammers, whose objective is to reduce the signal-tonoise ratio, and
spoo ng/meaconing attacks, whose objectives is to inject false or erroneous information into the receiver. Expand
1 PDF  •  View 1 excerpt, cites background Save Alert

On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats
Anna Angelogianni, I. Politis, Farnaz Mohammadi, C. Xenakis  •  Computer Science  •  IEEE Access  •  2020

TLDR  The proposed methodology has been designed to aid both, mobile operators towards planning more effective cybersecurity strategies
and adopting e cient defences to minimise the probability of an attack and predict its impact on the operational, market and business
aspects of mobile network operators. Expand
4 PDF  •  View 1 excerpt, cites background Save Alert

SigUnder: a stealthy 5G low power attack and defenses


Norbert Ludant, G. Noubir  •  Computer Science  •  WISEC  •  2021

TLDR  SicUnder, an attack that enables an adversary to overshadow the Signal Synchronization Block with an injected signal at 3.4dB below
the legitimate signal is disclosed and SIC under, an extension of Successive Interference Cancellation is introduced to be able to address the
unique challenges that SigUnder poses. Expand
3  •  Save Alert

E cient privacy-preservation scheme for securing urban P2P VANET networks


B. Alaya  •  Computer Science  •  2020
1  •  Save Alert

Threat modeling framework for mobile communication systems


S. Rao, S. Holtmanns, T. Aura  •  Computer Science  •  ArXiv  •  2020

TLDR  This work systematically organize the attacks on mobile communications into various tactics and techniques, designed to model
adversarial behavior in terms of its attack phases and to be used as a common taxonomy matrix. Expand
3 PDF  •  Save Alert

Adversarial Trends in Mobile Communication Systems: From Attack Patterns to Potential Defenses Strategies
Hsin Yi Chen, S. Rao  •  Computer Science  •  Secure IT Systems  •  2021

Save Alert

1 2

References

SHOWING 1-10 OF 13 REFERENCES SORT BY Relevance


The GSM/UMTS Phone Number Catcher


Yubo Song, Xili Hu, Zhiling Lan  •  Computer Science  •  2011 Third International Conference on Multimedia Information Networking and Security  •  2011

TLDR  The GSM protocol which is relevant to the phone number catcher is analyzed and later the performance of such a system by real tests
and demonstrate its feasibility are presented. Expand
13  •  View 1 excerpt, references methods Save Alert

Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems
Altaf Shaik, J. Seifert, R. Borgaonkar, N. Asokan, Valtteri Niemi  •  Computer Science  •  NDSS  •  2016

TLDR  This work constitutes the rst publicly reported practical attacks against LTE access network protocols and recommends that safety
margins introduced into future speci cations to address such trade-offs should incorporate greater agility to accommodate subsequent
changes in the trade-off equilibrium. Expand
220 PDF  •  View 1 excerpt, references methods Save Alert

LTE security, protocol exploits and location tracking experimentation with low-cost software radio
R. Jover  •  Computer Science  •  ArXiv  •  2016

TLDR  This manuscript, which summarizes and expands the results presented by the author at ShmooCon 2016, investigates the insecurity
rationale behind LTE protocol exploits and LTE rogue base stations based on the analysis of real LTE radio link captures from the production
network. Expand
49 PDF  •  View 1 excerpt, references background Save Alert

Easy 4G/LTE IMSI Catchers for Non-Programmers


S. F. Mjølsnes, Ruxandra F. Olimid  •  Computer Science  •  MMM-ACNS  •  2017

TLDR  This work demonstrates that IMSI Catcher attacks are really practical for the state-of-the-art 4G/LTE mobile systems too and can be
easily built and operated using readily available tools and equipment, and without any programming. Expand
42 PDF  •  View 2 excerpts, references background Save Alert

Exposing LTE Security Weaknesses at Protocol Inter-layer, and Inter-radio Interactions


M. T. Raza, F. Anwar, Songwu Lu  •  Computer Science  •  SecureComm  •  2017

TLDR  This work categorizes the uncovered vulnerabilities in three dimensions, i.e., authentication, security association and service
availability, and veri es these vulnerabilities in operational LTE networks and proposes remedies for the identi ed attacks. Expand
13 PDF  •  Save Alert

Security attacks against the availability of LTE mobility networks: Overview and research directions
R. Jover  •  Computer Science  •  2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC)  •  2013

TLDR  An overview of the current threat landscape against the availability of LTE mobility networks is presented and a set of areas of focus
that should be considered in mobility security in order to guarantee availability against security attacks are identi ed. Expand
94  •  Save Alert

LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE


Syed Ra ul Hussain, Omar Chowdhury, Shagufta Mehnaz, E. Bertino  •  Computer Science, Mathematics  •  NDSS  •  2018

TLDR  A modelbased testing approach LTEInspector is proposed which lazily combines a symbolic model checker and a cryptographic
protocol veri er in the symbolic attacker model for exposing vulnerabilities in the 4G LTE protocol. Expand
122 PDF  •  View 1 excerpt, references background Save Alert

Demo: OpenAirInterface: an open LTE network in a PC


N. Nikaein, R. Knopp, +4 authors R. Ghaddab  •  Computer Science  •  MobiCom  •  2014

TLDR  This work presents OpenAirInterface (OAI) as a suitably exible platform towards open LTE ecosystem and playground and
demonstrates an example of the use of OAI to deploy a low-cost open LTE network using commodity hardware with standard LTE-compatible
devices. Expand
82  •  View 1 excerpt, references background Save Alert

Software De ned Radio Architectures Systems And Functions


Frank Wannemaker  •  Computer Science  •  2016

TLDR  This software de ned radio architectures systems and functions will help people to enjoy a good book with a cup of coffee in the
afternoon instead of having to cope with some malicious virus inside their computer. Expand
89 PDF  •  View 1 excerpt, references background Save Alert

Edge-enabled Disaster Rescue


F. Liu, Yeting Guo, Zhiping Cai, Nong Xiao, Ziming Zhao  •  Computer Science  •  ACM Trans. Intell. Syst. Technol.  •  2019

TLDR  Echo, a highly time-e cient disaster rescue framework based on edge computing, is proposed and an adaptive photo detector is
designed to utilize the precious and unstable communication bandwidth effectively, as well as ensure the photo detection precision and recall
rate. Expand
6  •  View 1 excerpt, references background Save Alert

1 2

Related Papers

Stay Connected With Semantic Scholar Your E-mail Address Sign Up

What Is Semantic Scholar? About Product Research Help


Semantic Scholar is a free, AI-powered research tool for About Us Beta Program Team FAQ
scienti c literature, based at the Allen Institute for AI. Publishers S2AG API Publications Librarians
Learn More Blog Semantic Reader Projects Tutorials
Careers Resources Contact

Proudly built by AI2


Collaborators & Attributions • Terms of Service • Privacy Policy

You might also like