Unblocking stolen mobile devices using SS7-MAP vulnerabilities: Exploiting the relationship between IMEI and IMSI for EIR access

Siddharth Prakash Rao, Silke Holtmanns, Ian Oliver, Tuomas Aura

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

21 Citations (Scopus)

Abstract

The increase in usage of mobile phones and the relative increase in the number of mobile phone thefts have imposed an overhead on securely retrieving the stolen or missing devices. While the mobile security researchers try to figure out various mechanisms to track such devices, attackers on the other hand are trying to exploit weaknesses in the mobile network system to dissipate into the dark side with stolen devices. In this paper, we present how the SS7- MAP protocol can be misused to help an attacker to unblock the device from the stolen list and use it normally.

Original languageEnglish
Title of host publicationProceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015
PublisherIEEE
Pages1171-1176
Number of pages6
Volume1
ISBN (Electronic)9781467379519
DOIs
Publication statusPublished - 2 Dec 2015
MoE publication typeA4 Conference publication
EventIEEE International Conference on Trust, Security and Privacy in Computing and Communications - Crowne Plaza Hotel, Helsinki, Finland
Duration: 20 Aug 201522 Aug 2015
Conference number: 14

Conference

ConferenceIEEE International Conference on Trust, Security and Privacy in Computing and Communications
Abbreviated titleTrustcom
Country/TerritoryFinland
CityHelsinki
Period20/08/201522/08/2015

Keywords

  • EIR
  • IMEI
  • MAP
  • SS7
  • Stolen Mobiles

Fingerprint

Dive into the research topics of 'Unblocking stolen mobile devices using SS7-MAP vulnerabilities: Exploiting the relationship between IMEI and IMSI for EIR access'. Together they form a unique fingerprint.

Cite this