5G-Pentest-UE: A Penetration Testing Framework for Identifying 5G System Vulnerabilities
Research output: Contribution to conferences › Paper › Contributed › peer-review
Contributors
Abstract
This paper presents and evaluates an open source penetration testing framework for finding vulnerabilities in 5G systems under the assumption of malicious end devices. This is achieved by enabling the creation of arbitrary (5G) messages to be transmitted over the air interface of a 5G system. Our framework is modular and scriptable, allowing the easy creation of test cases. It is based on the OpenAirInterface (OAI) open source 5G stack. We evaluated our framework by implementing several tests and running it against a well-known open source 5G system. We were able to identify several vulnerabilities.
Details
| Original language | English |
|---|---|
| Pages | 326-339 |
| Number of pages | 14 |
| Publication status | Published - 2025 |
| Peer-reviewed | Yes |
| Externally published | Yes |
Conference
| Title | 20th International conference on Availability, Reliability and Security |
|---|---|
| Abbreviated title | ARES 2025 |
| Conference number | 20 |
| Duration | 11 - 14 August 2025 |
| Website | |
| Location | University of Ghent |
| City | Ghent |
| Country | Belarus |
External IDs
| Scopus | 105014482356 |
|---|---|
| ORCID | /0000-0002-0466-562X/work/199216542 |
Keywords
ASJC Scopus subject areas
Keywords
- 5G, OpenAirInterface, mobile networks, penetration testing, security, user equipment, vulnerabilities