Using a python-base 5G network componet emulator to emulate user equipment (UE) authentication and authorization procedure when 5G UE registration to 5G core network (5GC) via a 5G base station (gNB). Our presentation include two major categories of security attack surface: the 1st category is to deceive and hyjack a legal UE by 5G false base station (FBS) with 5G false core network; and 2nd category is demostation of penetrating 5G core network (5GC) from a malicious UE.
TOPIC / TRACK
AIoT & Hardware Security Summit
LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F AIoT & Hardware Security Zone
LEVEL
Advanced Advanced sessions explore cybersecurity topics, including architecture, tools, practical experiences, and strategy comparisons. Content often features code explanations, protocol analysis, reverse engineering, live demos, and is suitable for experienced cybersecurity professionals.
SESSION TYPE
Breakout Session
LANGUAGE
Chinese
SUBTOPIC
Telecom Security
5G Security
Network Security
CYBERSEC 2024 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。