LTE Pwnage: Hacking HLR/HSS and MME Core Network Elements. P1 Security



Similar documents
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Worldwide attacks on SS7 network

LTE Attach and Default Bearer Setup Messaging

LTE Overview October 6, 2011

SS7 & LTE Stack Attack

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT

LTE X2 Handover Messaging

4G Mobile Networks At Risk

Delivery of Voice and Text Messages over LTE

Remotely crashing HLR MSC STP

Advanced SIP Series: SIP and 3GPP Operations

Implementing LTE International Data Roaming

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

Diameter in the Evolved Packet Core

IP Multimedia System: general aspects and migration perspectives

Mobile network evolution A tutorial presentation

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

UNDERSTANDING CORE TELECOM SECURITY

Telecom Signaling attacks on 3G and LTE networks

Wanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture

Security researcher at P1 Security. Hacking Telco equipment: The HLR/HSS Laurent Ghigonis P1 Security

Applying Software Defined Networks and Virtualization Concepts for Next Generation Mobile Broadband Networks

Cisco ASR 5000 Mobility Management Entity Administration Guide

Protocol Signaling Procedures in LTE

Technical white paper. Enabling mobile broadband growth Evolved Packet Core

Public Safety Communications Research. LTE Demonstration Network Test Plan. Phase 3 Part 1: Network Interoperability & Drive Test. Version 2.

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen

Whitepaper. 10 Metrics to Monitor in the LTE Network. blog.sevone.com

Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com

SAE and Evolved Packet Core

CS Fallback Function for Combined LTE and 3G Circuit Switched Services

Overview of the Evolved packet core network

Architecture Overview NCHU CSE LTE - 1

Introduction to Evolved Packet Core

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

Single Radio Voice Call Continuity. (SRVCC) with LTE. White Paper. Overview. By: Shwetha Vittal, Lead Engineer CONTENTS

Mobile Packet Backbone Network Training Programs. Catalog of Course Descriptions

10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated

CMPT 471 Networking II

Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks

3GPP Long Term Evolution: Architecture, Protocols and Interfaces

How To Understand And Understand The Gsp Protocol On A Cell Phone Or Ipad Or Ipa (For A Cell) On A Sim Simlan 2 Or Ipam (For An Ipa) On An Ipad 2 Or 4 Or Ipap

Mobile Network Security

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

464XLAT in mobile networks

Philippe Langlois, P1 Security Inc.

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

Mobility Management for All-IP Core Network

IPV6 IN MOBILE NETWORKS

LTE Performance and Analysis using Atoll Simulation

ETSI TS V8.0.0 ( ) Technical Specification

SOLUTIONS FOR ROAMING AND INTEROPERABILITY PROBLEMS BETWEEN LTE AND 2G OR 3G NETWORKS

LTE Security How Good Is It?

Nokia Siemens Networks Flexi Network Server

Mobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca

Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy

Evolution of the 3GPP Network Architecture, (the Evolved Packet Core)

ETSI TS V9.0.0 ( ) Technical Specification

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Demo 1. Network Path and Quality Validation in the Evolved Packet Core

Network functions virtualization and software management

Overview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background

Cisco ASR 5000 Series Mobility Management Entity Administration Guide

Securing the Interconnect Signaling Network Security

Design and Implementation of a Distributed Mobility Management Entity (MME) on OpenStack

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Performance validation for the mobile core

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

Private DNS for Mobile Operators

Chapter 10 VoIP for the Non-All-IP Mobile Networks

Towards Software Defined Cellular Networks

Intel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks

LTE CDMA Interworking

Author: Yaniv Balmas, ERT Lab Security Researcher November Mobile Network Security Availability Risks in Mobile Networks

Single Radio Voice Call Continuity (SRVCC) Testing Using Spirent CS8 Interactive Tester

Building Robust Signaling Networks

464XLAT: Breaking Free of IPv4. APRICOT 2014

Best Practices for Securing IP Telephony

ETSI TS V8.0.0 ( ) Technical Specification

Long Term Evolution - LTE. A short overview

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Kamakshi Sridhar, PhD Distinguished Member of Technical Staff Director Wireless CTO organization

3GPP TS V8.0.0 ( )

SERVICE CONTINUITY. Ensuring voice service

LTE service area. 3G service area. EPS : Evolved Packet System. Currently Planning & Coordination Office 1 C *

Protecting Critical Infrastructure

Supporting mobility in the RAN cloud

Study of Long Term Evolution Network, its Architecture along with its Interfaces

Nokia Siemens Networks Flexi Network Gateway. Brochure

Malicious Network Traffic Analysis

Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Transcription:

LTE Pwnage: Hacking HLR/HSS and MME Core Network Elements P1 Security 1

LTE ENVIRONMENT 2

LTE Network Overview 3

Corporate & Mobile Data risk increased LTE from agackers perspechve All IP always on always vulnerable? Spear- Phishing Botnets & Malware Flooding Trojan & Backdoors IPv6 renders NAT protechon inefficient Split Handshake TCP agacks prevents IPS and AnHvirus Very familiar architecture for agackers: ATCA, Linux Intricate and new protocols: Diameter, S1, X2, GTP 4

2G 3G to LTE: Reality and Legacy 2G 3G LTE BTS Node B enode B BSC merged into Node B merged into enode B MSC / VLR RNC MME, MSC Proxy HLR HLR, IMS HSS, HE LTE SAE HSS, SDR/SDM STP STP, SG Legacy STP GGSN GGSN PDN GW SGSN SGSN MME/SGW IN IN/PCRF PCRF RAN Firewall RAN Firewall SeGW 5

User data content: LTE User Plane 6

LTE Network AGack Surface Full IP only? No: full IP double exposure Packets (PS Domain) 2x agack surface GTP shll present S1AP/X2AP new Circuits (CS Domain) 2x agack surface SIGTRAN & SS7 will stay for many years IMS & Diameter 7

3G and LTE together RAN EPC 8

CSFB vs. VOLTE vulnerability agack surface CSFB CS Fall Back from 4G to 3G Past is present SS7 and SIGTRAN stack vulnerabilihes (DoS, spoof, ) VOLTE Whole new agack surface New APN, new network to hack, new servers, Closer to the Core Network == more serious vulns IMS (CSCF = SIP server, DNS, ) Standard? No 9

ISUP injechon in SIP through VOLTE Yes, SIP known but Internet SIP + SS7 ISUP == SIP- I and SIP- T == ISUP InjecHon! Remote Core Network DoS SS7 compromise External signaling injection Spoofing of ISUP messages Fake billing Ouch!

11

CSFB AGack surface through MSC Proxy and SS7 + SIGTRAN All SIGTRAN agack surface exposed All SS7 agack surface exposed Most dangerous: Logical Denial of Service agacks SSP- based SCCP DoS (P1 CVID#480) TFP- based SS7 DoS (P1 CVID#481) Equipment Crash/Denial of Service agacks Ericsson MSC Crash DoS (P1 VID#330) NSN HLR Crash DoS (P1 VID#148) Ericsson STP Crash DoS (P1 VID#187) 12

P1vid#148 - https://saas.p1sec.com/vulns/148 NSN NGHLR remote Denial of Service caused by fragile SS7 stack Severity Critical Description Impact NGHLR SS7 stack software is not robust and suffers from Remote Denial of Service. Enables any person sending malicious SCCP traffic to the HLR to crash it. This includes the whole international SS7 network as HLRs need always to be globally reachable. Reliability for telco Ability to cope with X million of requests Not Ability to cope with malformed traffic

P1vid#145 - https://saas.p1sec.com/vulns/145 GSM MAP primihve MAP_FORWARD_ACCESS_SIGNALLING enables RAN signaling injechon Severity Medium Spoofed Description This GSM MAP MSU "MAP_FORWARD_ACCESS_SIG NALLING" forwards any content to the Radio Access Network (RAN). Normal Impact The result is that some external entities may send or spoof MAP_FORWARD_ACCESS_SIGN ALLING MSUs to target MSC GTs and have the vulnerable MSCs to inject this signaling into the radio network (typically RANAP). Spoof and inject radio signaling As if it was coming from Radio Network

P1vid#213 - https://saas.p1sec.com/vulns/213 Fun AnH- forensics Same agack as VID#187 Also crash Ericsson traffic monitoring log analysis forensic tools (P1 VKD VID#213) Code sharing between enforcement and forensic tools 15

3G and LTE together RAN EPC 16

Peer to Peer Radio Access Network X2AP enodeb s Peer to Peer TranslaHon Every base stahon can talk to every other Network agack surface increase Total spread into the RAN network Operator- wide L2 network L2 agacks, less defense in depth, scanning only blocked by size of network Did GTP disappear? No 17

User data btw enbs: LTE User Plane 18

LTE RAN Overview Evolved Packet Network (EPC) MME SGW Mul OSS-RC SeGW LTE RAN S1 CP S1 UP IP/Ethernet transport Mul S1 X2 Mul S1 X2 Mul S1 X2 Typically a common physical connection! 19

Pwning OSS: L2 network mistakes always happen Can t catch it with mulhple overlapping /8 networks: automate! From any enodeb to the NMS From any enodeb to any enodeb You can bet on insecure provisioning American example & Remote misconfigurahon 20

enodeb Hardware AGacks Ericsson RBS 6602 DUS (2G+3G+4G) & DUL (4G) Radio Uplink to DWDM / Optical net Local Ethernet ports (not TDM anymore) Hardware (in)security system 21

LTE: Equipment AGack surface increase Diameter (New) Added surface New code, maturity in queshon Very few commercial fuzzers support it Even less really trigger bugs in Diameter (depth pbm) S1/X2AP (New) GTP + MAP within two completely new protocols With encapsulahon of user traffic (Non Access Stratum protocol) What could possibly go wrong? 22

23

24

Diameter audit/fuzzing problem 25

Auditor bias #1: Open standards doesn't mean vision Diameter Nearly every parameter is ophonal Result Nobody knows what is a valid combinahon To test / fuzz / inject Combinatorial explosion Sequence / Dialogue / Flow AVP combinahon AVP values Fuzzed parameter Even manufacturer don t know how to successfully instrument the Device Under Test Fuzzer Support is not Fuzzer successful triggering 26

Auditor bias #2: Fuzzing is as deep as fuzzer goes And fuzzer never go deep enough Commercial fuzzer 0 trigger/1000 iteration! Standard own fuzzer 13 triggers/1000 iterations!! Need target- specific development Customized own fuzzer: 85 triggers/1000 iterations! 27

LTE: New risk with Diameter Diameter informahon network disseminahon Diameter awesomeness distribuhon/centralizahon its own evil side Present in many database HSS, SDM/SDR, CUD The goal was to centralize The result is one more database 28

LTE Huawei Specific USN = SGSN + MME UGW = SeGW + SGW + PDN GW / PGW 29

Pwning LTE HSS: C++ SQL InjecHon everywhere 30

LTE HSS Pwning methodology OSS is considered Core It is accessible by enodebs SomeHme: Network filtering mistakes Osen: Allowed for Provisionning OSS can connect to HSS HSS exports too many services Mux/Tunnel kind of thinking one port == many services 31

LTE EPC funchonal plane, no OAM 32

Add OAM: complexity explosion 33

Auditor bias #3: Manual vision is always incomplete Need some automahon 200 APNs * 16 million IPs == need to have dedicated scanner Each valid GTP tunnel is a new 16 millions IPs to scan Address space explosion You CANNOT do it manually You CANNOT do it without specific scanners 34

Pwning MME: Hardcoded encryphon keys P1 VKB CVID#485 DES Hardcoded keys everywhere 35

Demo 36

Legacy PS Interfaces of interest to LTE Gi : Interface from GGSN to Internet Gn : Interface between SGSN and other SGSN and (internal) GGSN Gp : Interface between Internal SGSN and external GGSN (GRX used here) 37

Leaks to Internet Passive DNSmon Leaks to GPRS Leaks to 3G data Leaks to LTE EPC edns vs idns

Legacy GPRS / UMTS GRX TLD / Domain.gprs Quite monolithic: APN RAI rai<rai>. mnc08. mcc204.gprs Only APNs and some network element 39

IMS DNS 3gppnetwork.org Supports and lists all Network Element LAC RAC Examples rac<rac>.lac<lac>.mnc08.mcc204.gprs 40

LTE EPC DNS Same as IMS DNS but extended Supports and lists most SAE EPC Network Elements MME SGW Examples mmec<mmec>.mmegi<mmegi>.mme.epc.mnc99.mcc208.3gppnetwork.org! 41

Pwning from LTE mobile Infrastructure Reverse path protechon LTE Mobile data access RFC1918 leaks (SomeHme) Datacom IP infrastructure access (Now more osen) NAT CGNAT 42

Pwning from external: Direct MML access from Internet Pwning from external without any reverse path trick. Shodan doesn t work on these MML agack surface exposed NAT CGNAT 43

Auditor bias #4: Testbed is always more secure Testbed is more secure than produchon Legacy impact Scalability impact Audit is osen only permiged in testbed Liability PotenHal for Denial of Service Result AGackers advantage ProducHon goes untested 44

Auditor bias #4: Testbed is always more secure Testbed is more secure than produchon Legacy impact Scalability impact There s always something more on the prod network Audit is osen only permiged in testbed Liability PotenHal for Denial of Service Result AGackers advantage ProducHon goes untested 45

Technical Capacity & Knowledge issue Who Can audit all new LTE protocols and legacy protocols Has experhse on the architectures & vendors equipment Guarantee Scanning quality Coverage on all protocols & arch (CSFB, IMS, Hybrid, SCharge) Cover all perimeters and accesses APNs GRX & IPX accesses Split DNS User plane and control plane 46

Conclusion LTE is supposed to be built with security Difference between standardizahon and real security Network Equipment Vendors are shll lagging Opening up of the technology Good: deeper independent security research Operators SHll disinformed by vendors Security through obscurity in 2013! Unbelievable! Some are gezng proachve 47

Contact: Philippe.Langlois@p1sec.com hgp://www.p1sec.com THANKS! SEE YOU AT: HACKITO ERGO SUM MAY 2-4 2013 PARIS, FRANCE 48

BACKUP SLIDES 49

Interfaces 50

LTE Network 51

Previous LTE services & missions LTE Complete infrastructure audit Huawei LTE EPC Core Network audit & vulnerability research LTE CSFB infrastructure integrahon with legacy audit both Diameter, S1, X2 and SS7 integrahon for CS FallBack Ericsson enodeb audit and product security review Diameter security audit on LTE & IMS Core 52

LTE audit milestones 1. External LTE teshng, scan & audit (blackbox) LTE new elements IntegraHon with legacy 2. LTE eran onsite audit enodeb, enrollment, configurahon & PSR/PVR OSS & OAM 3. LTE EPC Core Network audit MME S- GW & PDN GW HSS PCRF 4. MBSS Minimum Baseline Security Standard LTE eran: enodeb, SeGW, OSS & enrollment servers LTE EPC: MME, S- GW, PCRF, HSS, PDN GW, MSC Proxy 53

INTERFACES 54

Interfaces 55

ADDRESSING IN LTE 56

Core Network: IP addresses everywhere Everything uses IP addresses User: UE, RAN: enodeb, SeGW EPC: MME, HSS, SGW, PGW IPv4 IPv6 is actually really being supported 57

Telecom- specific addressing End user addresses: GUTI, IMSI, 58

GUTI Globally Unique Temporary IdenHty (GUTI) Allocated by the MME to the UE GUTI = GUMMEI + M- TMSI GUMMEI = Globally Unique MME ID GUMMEI = MNC + MCC + MMEI MMEI = MMEGI + MMEC» MMEGI = MME Group ID» MMEC = MME Code M- TMSI == MME TMSI GPRS/UMTS P- TMSI - > LTE M- TMSI S- TMSI = MMEC + M- TMSI 59

GUTI in Pictures 60

RAI/P- TMSI mapping to GUTI! 61

GUTI mapping to P- TMSI! 62

TAC and RNC ID! 63

ADRESS MAPPING IN DNS 64

Legacy GPRS / UMTS GRX TLD / Domain.gprs Quite monolithic: APN RAI rai<rai>. mnc08. mcc204.gprs 65

IMS DNS 3gppnetwork.org Supports LAC RAC Examples rac<rac>.lac<lac>.mnc08.mcc204.gprs 66

LTE EPC DNS Same as IMS DNS but extended Supports MME SGW Examples mmec<mmec>.mmegi<mmegi>.mme.epc.mnc99.mcc 208.3gppnetwork.org 67

TECHNOLOGY BACKGROUNDER 68

LTE Data Terminology GTP = GPRS Tunneling Protocol EPS = Evolved Packet Service, LTE data sessions EPC = Evolved Packet Core, the LTE core network APN = Access Point Name (same as 2G/3G) Bearer = PDP session, GTP Tunnel for a given used SeGW = Security Gateway, segments enb / EPC SGW = Serving Gateway, like GGSN, connects to Internet 69

PDP Context vs. EPS Bearer UMTS and GPRS data session Packet Data Protocol (PDP) Context AGach (Alert SGSN) - > PDP Context AcHvaHon procedure LTE data session Evolved Packet System (EPS) Bearer Default EPS Bearer Dedicated EPS Bearer Both use parameters: Access Point Name (APN), IP address type, QoS parameters 70

LTE GTP = egtp GTP- U From enodeb to PDN GW PGW aka Internet exit node Used to be the GGSN 71

GTP- U udp/2152 72

LTE Control Plane: enodeb- MME 73

S1AP sctp/36412 74

LTE Control Plane: enodeb- enodeb 75

X2AP sctp/36422 76

Protocol and port matrix Communicating nodes Protocol ports Protocol Source Destination Source Destination enodeb S-GW GTP-U/UDP 2152 2152 S-GW enodeb GTP-U/UDP 2152 2152 enodeb enodeb GTP-U/UDP 2152 2152 enodeb MME S1AP/SCTP 36422 36412 MME enodeb S1AP/SCTP 36412 36422 enodeb enodeb X2AP/SCTP 36422 36422 77

All is ASN1 All protocols described in ASN1 Different kind of Encoding BER Basic, standard TLV PER Packed, Aligned (APER) Unaligned (UPER) Described in ITU and 3GPP standards Require ASN1 CLASS keywords 78

LTE SIGNALING 79

Diameter Everywhere Diameter replaces SS7 MAP DSR Diameter Signaling Router 80

81

82

83

Security implicahon SCTP filtering to be generalized Benefit SCTP is config first most of the Hme Threat IP cloud is much more exploitahon friendly AGack techniques are known to many people Compromise consequences are more far- reaching than SS7 84

Diameter Roaming 85

Security rouhng and filtering in Diameter DSR Define rouhng & filtering rules Discriminants Indicators DesHnaHon- based: Realm, Host, ApplicaHon- ID OriginaHon- based: Realm, Host, ApplicaHon- ID Command- Code IMSIAddress 86

Future Diameter RouHng & Filtering 87

Security & Vulnerability of EPC Roaming Filtering even more important DSR filtering is not mature GRX problems amplified Impact of the GRX/IPX/IMS/SAE EPC DNS infrastructure in InformaHon Gathering Unique IdenHfier leaks much easier Privacy consequences 88

TESTING 89

TesHng Security in an LTE Environment Two kind of environment Testbed Live (also called ProducHon, Greenfield, AcHve) 90

LTE Testbed Security teshng Shielded teshng enodeb antenna output connected to a cable Cable arrives in test room A Shielded box in test room is connected to cable Phone / USB dongle is put inside the box for tests USB cable goes out of the box toward the test PC No RF is polluhng the spectrum Enables pre- auchon teshng 91

RelaHonship to Vendors Vendor usually prevent audit By limihng informahon By limihng access to Device Under Test By limihng access to testbed By threatening of potenhal problems, delays, responsibility, liability Most of the LTE teshng can happen transparently The vendor doesn t see the security audit team Presented as normal operator qualificahon Not presented as security audit Result only is presented when audit is finished 92

AUDITS 93

GTP Endpoint discovery Illegal connechon/associahon establishment User idenhty impersonahon Fuzzing Leak of user traffic to Core Network (EPC) to LTE RAN 94

X2AP Audit Endpoint discovery Illegal connechon/associahon establishment Fuzzing Reverse engineering of proprietary extensions MITM 95

S1AP Audit Endpoint discovery Illegal connechon/associahon establishment Fuzzing Reverse engineering of proprietary extensions MITM NAS injechon 96

LTE EPC DNS Audit EPC DNS is important EPC DNS scanner Close to GRX / IMS 97

ATTACKS 98

User agacks: EPS Bearer Security AGacks APN Bruteforcing IP SegmentaHon accessing operators RFC1918 internal networks GTP endpoint discovery from within Bearer Data Session Secondary EPS Bearer ExhausHon/Flood load DoS Max 11 to be tested Repeat setup/teardown of connechons PGW DiffServ teshng Scans the IP header DS bits (DifferenHated Services) to see difference in treatment by PGW 99

TOOLS 100

Basic audit tools LTE SIM card LTE USB Dongle LTE UE (User Equipment) = Phone RJ45 for Ethernet connechon to EPC/EUTRAN Wireshark Sakis3G and evoluhons for LTE support IPsec audit tool 101

Ideal audit tools GTP protocol stack & fuzzer SCTP MITM tool & fuzzer Ethernet/ARP MITM tool (egercap) S1AP protocol stack & fuzzer NAS protocol stack & fuzzer X2AP protocol stack & fuzzer Diameter protocol stack & fuzzer GRX, IMS, EPC DNS scanner 102

VirtualizaHon targets Huawei In progress HSS MSC Proxy PotenHal USN, Serving GW, PDN GW, MME ehrs integrated node (MME, HSS, SGW, PGW, ) Easier because one single node HP opportunity? 103

LTE Network VirtualizaHon 104

Huawei ATCA vs. PGP OSTA 2.0 Linux based OpenSuse 10.x or 11.x Old, unpatched kernel Proprietary extensions and SMP Some FPGA based boards Some OEM based integrahon (Switches AR40, Routers, ) PGP Older architecture More monolithic Harder to replicate 105

Hard problems Use same kernel (medium) Use licensing (medium) Load signed kernel modules (medium hard) Emulate FPGA and OEM integrahon (hard) Replicate network services / other NEs (hard) 106

HSS ATCA / OSTA 2.0 Few external hardware Moderately easy OperaHon in progress Based on HSS_V900R003 107

Virtualizing in context (CSFB) RAN EPC 108

MSC Proxy ATCA / OSTA 2.0 No external hardware Moderately easy ConfiguraHon with exishng SS7 SIGTRAN infrastructure Diameter testbed 109

USN USN_V900R011C02SPC100 Harder 110

Ericsson Difficult to deal with them Very protechve Access Licensing DocumentaHon 111

NSN PotenHally easier than Ericsson Linux based (SGSN, ) MontaVista Some security features 112

Cisco Some virtualizahon done IOS 12.x Some virtualizahon needs hardware Cisco 7200 Cisco ITP Cisco GGSN Virtual networking Our technology for adapted virtualizahon 113

Our advantage so far Virtualize x86 with specific/signed kernels and modules Virtualize MIPS EmulaHon of specific hardware support Kernel modules development Virtualize ARM Android based device for customer simulahon 114

Mobile + VAS virtualizahon Specific demand from customer Virtualize x86 based server Virtualize 10-20 Android clients Simulate fraudulent transachon within this flow Inject faults within repeated traffic 115

VIRTUALIZED SIGNALING FUZZING 116

Principle Proxies M3UA Proxy S1/X2 Proxy Diameter Proxy Made transparent SCTP Man in the Middle Packet forwarding 117

LTE increases risks Financial thes Privacy thes Hacking of corporate users M2M impact of worms and agacks LTE Mobile broadband usage as main internet connechon Protocols are untested and tradihonal fuzzer coverage is weak and shallow Network equipment is new and not as reliable as tradihonal network elements 118

Questions? 119