@article{thorn_english_butler_enck_2024, title={5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions}, url={https://doi.org/10.1145/3643833.3656134}, DOI={10.1145/3643833.3656134}, abstractNote={5G technology transitions the cellular network core from specialized hardware into software-based cloud-native network functions (NFs). As part of this change, the 3GPP defines an access control policy to protect NFs from one another and third-party network applications. A manual review of this policy by the 3GPP identified an over-privilege flaw that exposes cryptographic keys to all NFs. Unfortunately, such a manual review is difficult due to ambiguous documentation. In this paper, we use static program analysis to extract NF functionality from four 5G core implementations and compare that functionality to what is permissible by the 3GPP policy. We discover two previously unknown instances of over-privilege that can lead denial-of-service and extract sensitive data. We have reported our findings to the GSMA, who has confirmed the significance of these policy flaws.}, journal={PROCEEDINGS OF THE 17TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2024}, author={Thorn, Seaver and English, K. Virgil and Butler, Kevin R. B. and Enck, William}, year={2024}, month={May}, pages={66–77} } @article{english_bennett_thorn_butler_enck_traynor_2024, title={Examining Cryptography and Randomness Failures in Open-Source Cellular Cores}, url={https://doi.org/10.1145/3626232.3653259}, DOI={10.1145/3626232.3653259}, abstractNote={Industry is increasingly adopting private 5G networks to securely manage their wireless devices in retail, manufacturing, natural resources, and healthcare. As with most technology sectors, open-source software is well poised to form the foundation of deployments, whether it is deployed directly or as part of well-maintained proprietary offerings. This paper seeks to examine the use of cryptography and secure randomness in open-source cellular cores. We design a set of 13 CodeQL static program analysis rules for cores written in both C/C++ and Go and apply them to 7 open-source cellular cores implementing 4G and 5G functionality. We identify two significant security vulnerabilities, including predictable generation of TMSIs and improper verification of TLS certificates, with each vulnerability affecting multiple cores. In identifying these flaws, we hope to correct implementations to fix downstream deployments and derivative proprietary projects.}, journal={PROCEEDINGS OF THE FOURTEENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2024}, author={English, K. Virgil and Bennett, Nathaniel and Thorn, Seaver and Butler, Kevin R. B. and Enck, William and Traynor, Patrick}, year={2024}, month={Jun}, pages={43–54} }