Research Commons
      • Browse 
        • Communities & Collections
        • Titles
        • Authors
        • By Issue Date
        • Subjects
        • Types
        • Series
      • Help 
        • About
        • Collection Policy
        • OA Mandate Guidelines
        • Guidelines FAQ
        • Contact Us
      • My Account 
        • Sign In
        • Register
      View Item 
      •   Research Commons
      • University of Waikato Research
      • Health, Sport and Human Performance
      • Health, Sport and Human Performance Papers
      • View Item
      •   Research Commons
      • University of Waikato Research
      • Health, Sport and Human Performance
      • Health, Sport and Human Performance Papers
      • View Item
      JavaScript is disabled for your browser. Some features of this site may not work without it.

      Provable Non-Frameability for 5G Lawful Interception

      Boeira, Felipe; Asplund, Mikael; Barcellos, Marinho
      Thumbnail
      Files
      3558482.3581780.pdf
      Published version, 1.015Mb
      DOI
       10.1145/3558482.3581780
      Link
       dx.doi.org
      Find in your library  
      Permanent link to Research Commons version
      https://hdl.handle.net/10289/15939
      Abstract
      Mobile networks have grown in size and relevance, with novel applications in areas including transportation, finance, and health. The wide use of mobile networks generates rich data about users, raising interest in using such data for law enforcement and antiterrorism through Lawful Interception (LI). Countries worldwide have established legal frameworks to conduct LI, and technical standards have been created for its implementation and deployment, but without sufficient (and rigorous) security controls. While LI originated for benign purposes, we show in this paper that malicious entities could exploit it to frame users into suspicion of criminal activity. Further, we propose a solution for non-frameability, which we formally prove uphold desired properties even in scenarios where attackers completely infiltrate the operator networks. To perform the formal verification, we extend prior work with a more complete model of the fifth generation (5G) of mobile networks in the Tamarin prover.
      Date
      2023-05-29
      Type
      Conference Contribution
      Publisher
      ACM
      Rights
      © 2023 Authors. This work is licensed under a Creative Commons Attribution International 4.0 License.
      Collections
      • Health, Sport and Human Performance Papers [168]
      Show full item record  

      Usage

      Downloads, last 12 months
      21
       
       
       

      Usage Statistics

      For this itemFor all of Research Commons

      The University of Waikato - Te Whare Wānanga o WaikatoFeedback and RequestsCopyright and Legal Statement