5G-Pentest-UE: A Penetration Testing Framework for Identifying 5G System Vulnerabilities

Publikation: Beitrag zu KonferenzenPaperBeigetragenBegutachtung

Beitragende

  • Richard Riedel - , Barkhausen Institut gGmbH (Autor:in)
  • Stefan Köpsell - , Barkhausen Institut gGmbH (Autor:in)

Abstract

This paper presents and evaluates an open source penetration testing framework for finding vulnerabilities in 5G systems under the assumption of malicious end devices. This is achieved by enabling the creation of arbitrary (5G) messages to be transmitted over the air interface of a 5G system. Our framework is modular and scriptable, allowing the easy creation of test cases. It is based on the OpenAirInterface (OAI) open source 5G stack. We evaluated our framework by implementing several tests and running it against a well-known open source 5G system. We were able to identify several vulnerabilities.

Details

OriginalspracheEnglisch
Seiten326-339
Seitenumfang14
PublikationsstatusVeröffentlicht - 2025
Peer-Review-StatusJa
Extern publiziertJa

Konferenz

Titel20th International conference on Availability, Reliability and Security
KurztitelARES 2025
Veranstaltungsnummer20
Dauer11 - 14 August 2025
Webseite
OrtUniversity of Ghent
StadtGhent
LandBelarus

Externe IDs

Scopus 105014482356
ORCID /0000-0002-0466-562X/work/199216542

Schlagworte

Schlagwörter

  • 5G, OpenAirInterface, mobile networks, penetration testing, security, user equipment, vulnerabilities