Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- { / *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ }
- Cloning 3G/4G SIM Cards with a PC and an Oscilloscope:
- -) Lessons Learned in Physical Security
- -) Yu Yu joint work with Junrong Liu, F-X Standaert, Zheng Guo, Dawu Gu, Sun Wei, Yijie Ge, Xinjun Xie
- { / *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ *x**/ }
- • Background
- 1) 2G/3G/4G (U)SIM Security
- 2) cryptology, 2G/GSM AKA protocol
- • Our work
- 1) 3G/4G AKA protocol and MILENAGE algorithm
- 2) Side Channel Attack / Differential Power Analysis
- 3) Strategy, results and demos
- • Lessons learned
- SRC: https://www.blackhat.com/docs/us-15/materials/us-15-Yu-Cloning-3G-4G-SIM-Cards-With-A-PC-And-An-Oscilloscope-Lessons-Learned-In-Physical-Security.pdf
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement