5G-Pentest-UE: A Penetration Testing Framework for Identifying 5G System Vulnerabilities
Publikation: Beitrag zu Konferenzen › Paper › Beigetragen › Begutachtung
Beitragende
Abstract
This paper presents and evaluates an open source penetration testing framework for finding vulnerabilities in 5G systems under the assumption of malicious end devices. This is achieved by enabling the creation of arbitrary (5G) messages to be transmitted over the air interface of a 5G system. Our framework is modular and scriptable, allowing the easy creation of test cases. It is based on the OpenAirInterface (OAI) open source 5G stack. We evaluated our framework by implementing several tests and running it against a well-known open source 5G system. We were able to identify several vulnerabilities.
Details
| Originalsprache | Englisch |
|---|---|
| Seiten | 326-339 |
| Seitenumfang | 14 |
| Publikationsstatus | Veröffentlicht - 2025 |
| Peer-Review-Status | Ja |
| Extern publiziert | Ja |
Konferenz
| Titel | 20th International conference on Availability, Reliability and Security |
|---|---|
| Kurztitel | ARES 2025 |
| Veranstaltungsnummer | 20 |
| Dauer | 11 - 14 August 2025 |
| Webseite | |
| Ort | University of Ghent |
| Stadt | Ghent |
| Land | Belarus |
Externe IDs
| Scopus | 105014482356 |
|---|---|
| ORCID | /0000-0002-0466-562X/work/199216542 |
Schlagworte
ASJC Scopus Sachgebiete
Schlagwörter
- 5G, OpenAirInterface, mobile networks, penetration testing, security, user equipment, vulnerabilities