Unblocking stolen mobile devices using SS7-MAP vulnerabilities: Exploiting the relationship between IMEI and IMSI for EIR access

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Researchers

Research units

  • Nokia

Abstract

The increase in usage of mobile phones and the relative increase in the number of mobile phone thefts have imposed an overhead on securely retrieving the stolen or missing devices. While the mobile security researchers try to figure out various mechanisms to track such devices, attackers on the other hand are trying to exploit weaknesses in the mobile network system to dissipate into the dark side with stolen devices. In this paper, we present how the SS7- MAP protocol can be misused to help an attacker to unblock the device from the stolen list and use it normally.

Details

Original languageEnglish
Title of host publicationProceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015
Publication statusPublished - 2 Dec 2015
MoE publication typeA4 Article in a conference publication
EventIEEE International Conference on Trust, Security and Privacy in Computing and Communications - Crowne Plaza Hotel, Helsinki, Finland
Duration: 20 Aug 201522 Aug 2015
Conference number: 14

Conference

ConferenceIEEE International Conference on Trust, Security and Privacy in Computing and Communications
Abbreviated titleTrustcom
CountryFinland
CityHelsinki
Period20/08/201522/08/2015

    Research areas

  • EIR, IMEI, MAP, SS7, Stolen Mobiles

ID: 9382047