Figure 8: Identity Request (IMEI) followed by Attach Reject (no Identity Response).
REFERENCES
Bhattarai, S., Rook, S., Ge, L., Wei, S., Yu, W., and Fu, X.
(2014). On simulation studies of cyber attacks against
LTE networks. In 2014 23rd International Confer-
ence on Computer Communication and Networks (IC-
CCN), pages 1–8. IEEE.
Borgaonkar, R., Martin, A., Hirschi, L., Park, S., Shaik, A.,
and Seifert, J.-P. (2017). New adventures in spying 3G
and 4G users: Locate, track & monitor. Blackhat Las
Vegas Conference (to be presented).
Dabrowski, A., Petzl, G., and Weippl, E. R. (2016). The
messenger shoots back: Network operator based IMSI
catcher detection. In International Symposium on Re-
search in Attacks, Intrusions, and Defenses, pages
279–302. Springer.
Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M.,
and Weippl, E. (2014). IMSI-catch me if you can:
IMSI-catcher-catchers. In Proceedings of the 30th
annual computer security applications Conference,
pages 246–255. ACM.
ETSI TS 124 301 V12.6.0 (2014-10) (2014). Universal
Mobile Telecommunications System (UMTS); LTE;
Non-Access-Stratum (NAS) protocol for Evolved
Packet System (EPS); Stage 3 (3GPP TS 24.301 ver-
sion 12.6.0 Release 12).
ETSI TS 133 401 V10.3.0 (2012-07) (2012). Universal
Mobile Telecommunications System (UMTS); LTE;
3GPP System Architecture Evolution (SAE); Security
architecture (3GPP TS 33.401 version 10.3.0 Release
10).
Ettus Research (2017a). A National Instruments Company.
https://www.ettus.com/ Last accessed: April 2017.
Ettus Research (2017b). USRP B200mini (Board
only). https://www.ettus.com/product/details/USRP-
B200mini Last accessed: April 2017.
Gomez-Miguelez, I., Garcia-Saavedra, A., Sutton, P. D.,
Serrano, P., Cano, C., and Leith, D. J. (2016). srsLTE:
an open-source platform for LTE evolution and exper-
imentation. arXiv preprint arXiv:1602.04629.
gr-LTE (2017). GNU Radio LTE receiver.
https://github.com/kit-cel/gr-lte Last accessed:
April 2017.
Great Scott Gadgets (2017). HackRF One.
https://greatscottgadgets.com/hackrf/ Last accessed:
April 2017.
Jiao Xianjun (2017). Cell Scanner and Tracker.
https://github.com/JiaoXianjun/LTE-Cell-Scanner
Last accessed: April 2017.
Jover, R. P. (2013). Security attacks against the availability
of LTE mobility networks: Overview and research di-
rections. In Wireless Personal Multimedia Communi-
cations (WPMC), 2013 16th International Symposium
on, pages 1–9. IEEE.
Jover, R. P. (2016). LTE security, protocol exploits and loca-
tion tracking experimentation with low-cost software
radio. CoRR, abs/1607.05171.
Lichtman, M., Jover, R. P., Labib, M., Rao, R., Maroje-
vic, V., and Reed, J. H. (2016). LTE/LTE-a jamming,
spoofing, and sniffing: threat assessment and mitiga-
tion. IEEE Communications Magazine, 54(4):54–61.
Mjølsnes, S. F. and Olimid, R. F. (2017). Easy 4G/LTE
IMSI Catchers for Non-Programmers. arXiv preprint
arXiv:1702.04434.
Open Air Interface (2017). 5G software al-
liance for democratising wireless innovation.
http://www.openairinterface.org Last accessed: April
2017.
OpenLTE (2017). An open source 3GPP LTE implementa-
tion. https://sourceforge.net/projects/openlte/ Last ac-
cessed: April 2017.
Rupprecht, D., Jansen, K., and P
¨
opper, C. (2016). Putting
LTE security functions to the test: A framework
to evaluate implementation correctness. In 10th
USENIX Workshop on Offensive Technologies, WOOT
16, Austin, TX, August 8-9, 2016.
Shaik, A., Seifert, J., Borgaonkar, R., Asokan, N., and
Niemi, V. (2016). Practical attacks against privacy and
availability in 4G/LTE mobile communication sys-
tems. In 23nd Annual Network and Distributed System
Security Symposium, NDSS 2016, San Diego, Califor-
nia, USA, February 21-24, 2016.
srsLTE (2017). Open source 3GPP LTE library.
https://github.com/srsLTE/srsLTE Last accessed:
April 2017.
The Register (2016). Every LTE call, text, can
be intercepted, blacked out, hacker finds.
http://www.theregister.co.uk/2016/10/23/ Last
accessed: April 2017.
Wireshark (2017). https://www.wireshark.org/ Last ac-
cessed: April 2017.
SECRYPT 2017 - 14th International Conference on Security and Cryptography
512