Authors
Myrto Arapinis, Loretta Mancini, Eike Ritter, Mark Ryan, Nico Golde, Kevin Redon, Ravishankar Borgaonkar
Publication date
2012/10/16
Book
Proceedings of the 2012 ACM conference on Computer and communications security
Pages
205-216
Description
Mobile telephony equipment is daily carried by billions of subscribers everywhere they go. Avoiding linkability of subscribers by third parties, and protecting the privacy of those subscribers is one of the goals of mobile telecommunication protocols. We use formal methods to model and analyse the security properties of 3G protocols. We expose two novel threats to the user privacy in 3G telephony systems, which make it possible to trace and identify mobile telephony subscribers, and we demonstrate the feasibility of a low cost implementation of these attacks. We propose fixes to these privacy issues, which also take into account and solve other privacy attacks known from the literature. We successfully prove that our privacy-friendly fixes satisfy the desired unlinkability and anonymity properties using the automatic verification tool ProVerif.
Total citations
201120122013201420152016201720182019202020212022202320241214191416282325202718187
Scholar articles
M Arapinis, L Mancini, E Ritter, M Ryan, N Golde… - Proceedings of the 2012 ACM conference on …, 2012