CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications
- URL: http://arxiv.org/abs/2407.13742v1
- Date: Thu, 18 Jul 2024 17:48:46 GMT
- Title: CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications
- Authors: Mirza Masfiqur Rahman, Imtiaz Karim, Elisa Bertino,
- Abstract summary: We introduce a semi-automatic framework for inconsistency detection within the standards of 4G and 5G.
Our proposed method uses a revamped few-shot learning mechanism on domain-adapted large language models.
In our investigation, we focused on the Non-Access Stratum (NAS) and the security specifications of 4G and 5G networks, ultimately uncovering 157 inconsistencies with 82.67% accuracy.
- Score: 12.370608043864944
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In recent years, there has been a growing focus on scrutinizing the security of cellular networks, often attributing security vulnerabilities to issues in the underlying protocol design descriptions. These protocol design specifications, typically extensive documents that are thousands of pages long, can harbor inaccuracies, underspecifications, implicit assumptions, and internal inconsistencies. In light of the evolving landscape, we introduce CellularLint--a semi-automatic framework for inconsistency detection within the standards of 4G and 5G, capitalizing on a suite of natural language processing techniques. Our proposed method uses a revamped few-shot learning mechanism on domain-adapted large language models. Pre-trained on a vast corpus of cellular network protocols, this method enables CellularLint to simultaneously detect inconsistencies at various levels of semantics and practical use cases. In doing so, CellularLint significantly advances the automated analysis of protocol specifications in a scalable fashion. In our investigation, we focused on the Non-Access Stratum (NAS) and the security specifications of 4G and 5G networks, ultimately uncovering 157 inconsistencies with 82.67% accuracy. After verification of these inconsistencies on open-source implementations and 17 commercial devices, we confirm that they indeed have a substantial impact on design decisions, potentially leading to concerns related to privacy, integrity, availability, and interoperability.
Related papers
- Can Large Language Models Automate the Refinement of Cellular Network Specifications? [12.648016409257501]
This paper investigates the feasibility of Large Language Models (LLMs) for automated cellular network specification refinement.<n>Top models can discover security-related weaknesses in over 127 out of 200 test cases within five trials.<n> Evaluations on 30 cellular attacks identify open challenges for achieving full automation.
arXiv Detail & Related papers (2025-07-06T02:40:04Z) - Sec5GLoc: Securing 5G Indoor Localization via Adversary-Resilient Deep Learning Architecture [0.0]
5G millimeter-wave and sub-6 GHz networks enable high-accuracy indoor localization, but security and privacy vulnerabilities pose serious challenges.<n>We formalize a threat model encompassing attackers who inject forged radio signals or perturb channel measurements to mislead the localization system.<n>We propose an adversary-resilient localization architecture that combines deep learning fingerprinting with physical domain knowledge.
arXiv Detail & Related papers (2025-05-23T11:46:11Z) - CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations [53.036288487863786]
We propose CANTXSec, the first deterministic Intrusion Detection and Prevention system based on physical ECU activations.<n>It detects and prevents classical attacks in the CAN bus, while detecting advanced attacks that have been less investigated in the literature.<n>We prove the effectiveness of our solution on a physical testbed, where we achieve 100% detection accuracy in both classes of attacks while preventing 100% of FIAs.
arXiv Detail & Related papers (2025-05-14T13:37:07Z) - Formally Discovering and Reproducing Network Protocols Vulnerabilities [1.7965226171103972]
This paper introduces Network Attack-centric Compositional Testing (NACT), a novel methodology to discover new vulnerabilities in network protocols.
NACT integrates composable attacker specifications, formal specification mutations, and randomized constraint-solving techniques to generate sophisticated attack scenarios and test cases.
By supporting cross-protocol testing within a black-box testing framework, NACT provides a versatile approach to improve the security of network protocols.
arXiv Detail & Related papers (2025-03-03T13:50:20Z) - Secure Semantic Communication With Homomorphic Encryption [52.5344514499035]
This paper explores the feasibility of applying homomorphic encryption to SemCom.
We propose a task-oriented SemCom scheme secured through homomorphic encryption.
arXiv Detail & Related papers (2025-01-17T13:26:14Z) - CryptoFormalEval: Integrating LLMs and Formal Verification for Automated Cryptographic Protocol Vulnerability Detection [41.94295877935867]
We introduce a benchmark to assess the ability of Large Language Models to autonomously identify vulnerabilities in new cryptographic protocols.
We created a dataset of novel, flawed, communication protocols and designed a method to automatically verify the vulnerabilities found by the AI agents.
arXiv Detail & Related papers (2024-11-20T14:16:55Z) - Collaborative Inference over Wireless Channels with Feature Differential Privacy [57.68286389879283]
Collaborative inference among multiple wireless edge devices has the potential to significantly enhance Artificial Intelligence (AI) applications.
transmitting extracted features poses a significant privacy risk, as sensitive personal data can be exposed during the process.
We propose a novel privacy-preserving collaborative inference mechanism, wherein each edge device in the network secures the privacy of extracted features before transmitting them to a central server for inference.
arXiv Detail & Related papers (2024-10-25T18:11:02Z) - PriRoAgg: Achieving Robust Model Aggregation with Minimum Privacy Leakage for Federated Learning [49.916365792036636]
Federated learning (FL) has recently gained significant momentum due to its potential to leverage large-scale distributed user data.
The transmitted model updates can potentially leak sensitive user information, and the lack of central control of the local training process leaves the global model susceptible to malicious manipulations on model updates.
We develop a general framework PriRoAgg, utilizing Lagrange coded computing and distributed zero-knowledge proof, to execute a wide range of robust aggregation algorithms while satisfying aggregated privacy.
arXiv Detail & Related papers (2024-07-12T03:18:08Z) - Unprotected 4G/5G Control Procedures at Low Layers Considered Dangerous [4.235733335401408]
We study the complexity of the cellular standards and the high degree of cross-layer operations.
We find that current cellular systems are susceptible to several new passive attacks due to information leakage.
We identify active attacks that reduce the users' throughput by disabling RF front ends at the UE.
arXiv Detail & Related papers (2024-03-11T13:42:05Z) - Generative AI for Secure Physical Layer Communications: A Survey [80.0638227807621]
Generative Artificial Intelligence (GAI) stands at the forefront of AI innovation, demonstrating rapid advancement and unparalleled proficiency in generating diverse content.
In this paper, we offer an extensive survey on the various applications of GAI in enhancing security within the physical layer of communication networks.
We delve into the roles of GAI in addressing challenges of physical layer security, focusing on communication confidentiality, authentication, availability, resilience, and integrity.
arXiv Detail & Related papers (2024-02-21T06:22:41Z) - Seagull: Privacy preserving network verification system [0.0]
This paper introduces a novel approach to verify the correctness of configurations in the internet backbone governed by the BGP protocol.
Not only does our proposed solution effectively address scalability concerns, but it also establishes a robust privacy framework.
arXiv Detail & Related papers (2024-02-14T05:56:51Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis [12.073927880523305]
SPEC5G is the first-ever public 5G dataset for NLP research.
The dataset contains 3,547,586 sentences with 134M words, from 13094 cellular network specifications and 13 online websites.
Our results show the value of our 5G-centric dataset in 5G protocol analysis automation.
arXiv Detail & Related papers (2023-01-22T20:59:40Z) - Is Vertical Logistic Regression Privacy-Preserving? A Comprehensive
Privacy Analysis and Beyond [57.10914865054868]
We consider vertical logistic regression (VLR) trained with mini-batch descent gradient.
We provide a comprehensive and rigorous privacy analysis of VLR in a class of open-source Federated Learning frameworks.
arXiv Detail & Related papers (2022-07-19T05:47:30Z) - Neuro-Symbolic Artificial Intelligence (AI) for Intent based Semantic
Communication [85.06664206117088]
6G networks must consider semantics and effectiveness (at end-user) of the data transmission.
NeSy AI is proposed as a pillar for learning causal structure behind the observed data.
GFlowNet is leveraged for the first time in a wireless system to learn the probabilistic structure which generates the data.
arXiv Detail & Related papers (2022-05-22T07:11:57Z) - 5G Security and Privacy: A Research Roadmap [24.802753928579477]
5G - the latest generation of cellular networks - combines different technologies to increase capacity, reduce latency, and save energy.
We outline recent approaches supporting systematic analyses of 4G LTE and 5G protocols and their related defenses.
arXiv Detail & Related papers (2020-03-30T16:36:43Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.