Exploiting open functionality in SMS-capable cellular networks

Patrick Traynor, William Enck, Patrick McDaniel, Thomas La Porta

Research output: Contribution to journalArticle

25 Citations (Scopus)

Abstract

Cellular networks are a critical component of the economic and social infrastructures in which we live. In addition to voice services, these networks deliver alphanumeric text messages to the vast majority of wireless subscribers. To encourage the expansion of this new service, telecommunications companies offer connections between their networks and the Internet. The ramifications of such connections, however, have not been fully recognized. In this paper, we evaluate the security impact of the SMS interface on the availability of the cellular phone network. Specifically, we describe the ability to deny voice service to cities the size of Washington DC and Manhattan with little more than a cable modem. Moreover, attacks targeting the entire United States are feasible with resources available to medium-sized zombie networks. This analysis begins with an exploration of the structure of cellular networks. We then characterize network behavior and explore a number of reconnaissance techniques aimed at effectively targeting attacks on these systems. We conclude by discussing countermeasures that mitigate or eliminate the threats introduced by these attacks.

Original languageEnglish (US)
Pages (from-to)713-742
Number of pages30
JournalJournal of Computer Security
Volume16
Issue number6
DOIs
StatePublished - Nov 17 2008

Fingerprint

Telecommunication services
Modems
Cables
Availability
Internet
Economics
Industry

All Science Journal Classification (ASJC) codes

  • Software
  • Safety, Risk, Reliability and Quality
  • Hardware and Architecture
  • Computer Networks and Communications

Cite this

@article{613a7bb37554469c82d6db8f1d7e83c3,
title = "Exploiting open functionality in SMS-capable cellular networks",
abstract = "Cellular networks are a critical component of the economic and social infrastructures in which we live. In addition to voice services, these networks deliver alphanumeric text messages to the vast majority of wireless subscribers. To encourage the expansion of this new service, telecommunications companies offer connections between their networks and the Internet. The ramifications of such connections, however, have not been fully recognized. In this paper, we evaluate the security impact of the SMS interface on the availability of the cellular phone network. Specifically, we describe the ability to deny voice service to cities the size of Washington DC and Manhattan with little more than a cable modem. Moreover, attacks targeting the entire United States are feasible with resources available to medium-sized zombie networks. This analysis begins with an exploration of the structure of cellular networks. We then characterize network behavior and explore a number of reconnaissance techniques aimed at effectively targeting attacks on these systems. We conclude by discussing countermeasures that mitigate or eliminate the threats introduced by these attacks.",
author = "Patrick Traynor and William Enck and Patrick McDaniel and {La Porta}, Thomas",
year = "2008",
month = "11",
day = "17",
doi = "10.3233/JCS-2007-0308",
language = "English (US)",
volume = "16",
pages = "713--742",
journal = "Journal of Computer Security",
issn = "0926-227X",
publisher = "IOS Press",
number = "6",

}

Exploiting open functionality in SMS-capable cellular networks. / Traynor, Patrick; Enck, William; McDaniel, Patrick; La Porta, Thomas.

In: Journal of Computer Security, Vol. 16, No. 6, 17.11.2008, p. 713-742.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Exploiting open functionality in SMS-capable cellular networks

AU - Traynor, Patrick

AU - Enck, William

AU - McDaniel, Patrick

AU - La Porta, Thomas

PY - 2008/11/17

Y1 - 2008/11/17

N2 - Cellular networks are a critical component of the economic and social infrastructures in which we live. In addition to voice services, these networks deliver alphanumeric text messages to the vast majority of wireless subscribers. To encourage the expansion of this new service, telecommunications companies offer connections between their networks and the Internet. The ramifications of such connections, however, have not been fully recognized. In this paper, we evaluate the security impact of the SMS interface on the availability of the cellular phone network. Specifically, we describe the ability to deny voice service to cities the size of Washington DC and Manhattan with little more than a cable modem. Moreover, attacks targeting the entire United States are feasible with resources available to medium-sized zombie networks. This analysis begins with an exploration of the structure of cellular networks. We then characterize network behavior and explore a number of reconnaissance techniques aimed at effectively targeting attacks on these systems. We conclude by discussing countermeasures that mitigate or eliminate the threats introduced by these attacks.

AB - Cellular networks are a critical component of the economic and social infrastructures in which we live. In addition to voice services, these networks deliver alphanumeric text messages to the vast majority of wireless subscribers. To encourage the expansion of this new service, telecommunications companies offer connections between their networks and the Internet. The ramifications of such connections, however, have not been fully recognized. In this paper, we evaluate the security impact of the SMS interface on the availability of the cellular phone network. Specifically, we describe the ability to deny voice service to cities the size of Washington DC and Manhattan with little more than a cable modem. Moreover, attacks targeting the entire United States are feasible with resources available to medium-sized zombie networks. This analysis begins with an exploration of the structure of cellular networks. We then characterize network behavior and explore a number of reconnaissance techniques aimed at effectively targeting attacks on these systems. We conclude by discussing countermeasures that mitigate or eliminate the threats introduced by these attacks.

UR - http://www.scopus.com/inward/record.url?scp=55849122324&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=55849122324&partnerID=8YFLogxK

U2 - 10.3233/JCS-2007-0308

DO - 10.3233/JCS-2007-0308

M3 - Article

AN - SCOPUS:55849122324

VL - 16

SP - 713

EP - 742

JO - Journal of Computer Security

JF - Journal of Computer Security

SN - 0926-227X

IS - 6

ER -