Abstract
The increase in usage of mobile phones and the relative increase in the number of mobile phone thefts have imposed an overhead on securely retrieving the stolen or missing devices. While the mobile security researchers try to figure out various mechanisms to track such devices, attackers on the other hand are trying to exploit weaknesses in the mobile network system to dissipate into the dark side with stolen devices. In this paper, we present how the SS7- MAP protocol can be misused to help an attacker to unblock the device from the stolen list and use it normally.
Original language | English |
---|---|
Title of host publication | Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015 |
Publisher | IEEE |
Pages | 1171-1176 |
Number of pages | 6 |
Volume | 1 |
ISBN (Electronic) | 9781467379519 |
DOIs | |
Publication status | Published - 2 Dec 2015 |
MoE publication type | A4 Conference publication |
Event | IEEE International Conference on Trust, Security and Privacy in Computing and Communications - Crowne Plaza Hotel, Helsinki, Finland Duration: 20 Aug 2015 → 22 Aug 2015 Conference number: 14 |
Conference
Conference | IEEE International Conference on Trust, Security and Privacy in Computing and Communications |
---|---|
Abbreviated title | Trustcom |
Country/Territory | Finland |
City | Helsinki |
Period | 20/08/2015 → 22/08/2015 |
Keywords
- EIR
- IMEI
- MAP
- SS7
- Stolen Mobiles