Formal and Fuzzing Amplification: Targeting Vulnerability Detection in 5G and Beyond (2307.05758v1)
Abstract: Softwarization and virtualization in 5G and beyond require rigorous testing against vulnerabilities and unintended emergent behaviors for critical infrastructure and network security assurance. Formal methods operates efficiently in protocol-level abstract specification models, and fuzz testing offers comprehensive experimental evaluation of system implementations. In this paper, we propose a novel framework that leverages the respective advantages and coverage of both formal and fuzzing methods to efficiently detect vulnerabilities from protocol logic to implementation stacks hierarchically. The detected attack traces from the formal verification results in critical protocols guide the case generation of fuzz testing, and the feedbacks from fuzz testing further broaden the scope of the formal verification. We examine the proposed framework with the 5G Non Standard-Alone (NSA) security processes, focusing on the Radio Resource Control (RRC) connection process. We first identify protocol-level vulnerabilities of user credentials via formal methods. Following this, we implement bit-level fuzzing to evaluate potential impacts and risks of integrity-vulnerable identifier variation. Concurrently, we conduct command-level mutation-based fuzzing by fixing the assumption identifier to assess the potential impacts and risks of confidentiality-vulnerable identifiers. During this approach, we established 1 attack model and detected 53 vulnerabilities. The vulnerabilities identified used to fortify protocol-level assumptions could further refine search space for the following detection cycles. Consequently, it addresses the prevalent scalability challenges in detecting vulnerabilities and unintended emergent behaviors in large-scale systems in 5G and beyond.
- J. Alcaraz-Calero, I. P. Belikaidis, C. J. B. Cano, P. Bisson, D. Bourse, M. Bredel, D. Camps-Mur, T. Chen, X. Costa-Perez, P. Demestichas, M. Doll, S. E. Elayoubi, A. Georgakopoulos, A. Mämmelä, H. P. Mayer, M. Payaro, B. Sayadi, M. S. Siddiqui, M. Tercero, and Q. Wang, “Leading innovations towards 5G: Europe’s perspective in 5G Infrastructure Public-Private Partnership (5G-PPP),” in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, vol. 2017-October, 2018.
- M. Shatnawi, H. Altaleb, and R. Zoltán, “The digital revolution with nesas assessment and evaluation,” in 2022 IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems (ICCC). IEEE, 2022, pp. 000 099–000 104.
- A. Peltonen, R. Sasse, and D. Basin, “A comprehensive formal analysis of 5g handover,” in Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021, pp. 1–12.
- S. R. Hussain, M. Echeverria, I. Karim, O. Chowdhury, and E. Bertino, “5Greasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol,” in Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, 11 2019, pp. 669–684.
- G. Klees, A. Ruef, B. Cooper, S. Wei, and M. Hicks, “Evaluating fuzz testing,” in Proceedings of the ACM Conference on Computer and Communications Security, 2018.
- S. Bratus, A. Hansen, and A. Shubina, “Lzfuzz: a fast compression-based fuzzer for poorly documented protocols,” 2008.
- D. G. Berbecaru and G. Petraglia, “Tls-monitor: A monitor for tls attacks,” in 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC). IEEE, 2023, pp. 1–6.
- O-RAN Alliance, “O-RAN: Towards an Open and Smart RAN,” O-RAN Alliance, no. October, 2018.
- Software Radio Systems, “srsRAN is a 4G/5G software radio suite developed by SRS,” 2021.
- B. Blanchet, “Modeling and verifying security protocols with the applied pi calculus and proverif,” Foundations and Trends® in Privacy and Security, vol. 1, no. 1-2, pp. 1–135, 2016. [Online]. Available: http://dx.doi.org/10.1561/3300000004
- J. Yang, Y. Wang, T. X. Tran, and Y. Pan, “5g rrc protocol and stack vulnerabilities detection via listen-and-learn.” 2023 IEEE Consumer Communications & Networking Conference, January 2023.
- Y. Wang, A. Gorski, and A. da Silva, “Development of a Data-Driven Mobile 5G Testbed: Platform for Experimental Research,” in IEEE International Mediterranean Conference on Communications and Networking, 2021.
- I. Gomez-Miguelez, A. Garcia-Saavedra, P. D. Sutton, P. Serrano, C. Cano, and D. J. Leith, “srslte: An open-source platform for lte evolution and experimentation,” in Proceedings of the Tenth ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation, and Characterization, 2016, pp. 25–32.
- J.-K. Tsay and S. F. Mjølsnes, “A vulnerability in the umts and lte authentication and key agreement protocols,” in Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings 6. Springer, 2012, pp. 65–76.
- J. B. Bou Abdo, H. Chaouchi, and M. Aoude, “Ensured confidentiality authentication and key agreement protocol for eps,” in 2012 Symposium on Broadband Networks and Fast Internet (RELABIRA), 2012, pp. 73–77.
- 3GPP, “Universal Mobile Telecommunications System (UMTS); LTE; Mobility Management Entity (MME) Visitor Location Register (VLR) SGs interface specification,” 3rd Generation Partnership Project (3GPP), Technical Specification (TS) 29.118, 01 2015, version 8.5.0. [Online]. Available: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=1601
- M. Khan, P. Ginzboorg, K. Järvinen, and V. Niemi, “Defeating the downgrade attack on identity privacy in 5g,” in International Conference on Research in Security Standardisation. Springer, 2018, pp. 95–119.
- M. T. Raza, F. M. Anwar, and S. Lu, “Exposing lte security weaknesses at protocol inter-layer, and inter-radio interactions,” in Security and Privacy in Communication Networks: 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings 13. Springer, 2018, pp. 312–338.
- J. Yang, Y. Wang, Y. Pan, and T. X. Tran, “Systematic meets unintended: Prior knowledge adaptive 5g vulnerability detection via multi-fuzzing,” arXiv preprint arXiv:2305.08039, 2023.
- Z. Salazar, H. N. Nguyen, W. Mallouli, A. R. Cavalli, and E. M. Montes De Oca, “5Greplay: A 5G Network Traffic Fuzzer - Application to Attack Injection,” in ACM International Conference Proceeding Series. Association for Computing Machinery, 8 2021.