Back to Search Start Over

Attacks Against GSMA’s M2M Remote Provisioning (Short Paper)

Authors :
Ben Smyth
Elizabeth A. Quaglia
Maxime Meyer
Source :
Financial Cryptography and Data Security ISBN: 9783662583869, Financial Cryptography
Publication Year :
2018
Publisher :
Springer Berlin Heidelberg, 2018.

Abstract

GSMA is developing and standardizing specifications for embedded SIM cards with remote provisioning, called eUICCs, which are expected to revolutionize the cellular network subscription model. We study GSMA’s “Remote Provisioning Architecture for Embedded UICC” specification, which focuses on M2M devices, and we analyze the security of remote provisioning. Our analysis reveals weaknesses in the specification that would result in eUICCs being vulnerable to attacks: we demonstrate how a network adversary can exhaust an eUICC’s memory, and we identify three classes of attacks by malicious insiders that prevent service. We disclosed our findings to GSMA; GSMA confirmed the validity of these attacks and acknowledged their potential to disrupt the cellular industry. We propose fixes, which GSMA is incorporating into its specification. Thus, we improve security of next generation telecommunication networks.

Details

ISBN :
978-3-662-58386-9
ISBNs :
9783662583869
Database :
OpenAIRE
Journal :
Financial Cryptography and Data Security ISBN: 9783662583869, Financial Cryptography
Accession number :
edsair.doi...........b95c1653adf30bc587ed301b17214aec
Full Text :
https://doi.org/10.1007/978-3-662-58387-6_13