Explore the security transition from 4G to 5G networks in this comprehensive conference talk from BruCON Security Conference. Delve into newly discovered vulnerabilities affecting devices and subscribers, despite 5G's improved security measures. Examine a set of protocol vulnerabilities in 5G/4G networks, impacting operator equipment and consumer devices like phones, routers, IoT sensors, and car modems. Learn about automated tools developed to exploit cellular information and gain insights from shared research traces and datasets. Witness demonstrations of new hijacking, bidding down, and battery draining attacks using low-cost hardware and software tools. Discover the surprising results of worldwide testing to estimate affected base stations. Gain valuable knowledge about interactions with vendors and standard bodies, as well as potential fixes to prevent these attacks. Cover topics including WiFi importance, service base architecture, cloud security principles, 5G use cases, radio capabilities, mobile networks, fingerprints, man-in-the-middle attacks, power-saving mode, location tracking, authentication, and core network security.
Read more
Security Transition from 4G to 5G - Are We Secure Enough?