@inproceedings{f13f9fdd2e294296bad7fb3e9b1d0931,
title = "Symbolic analysis for security of roaming protocols in mobile networks [extended abstract]",
abstract = "Both GSM (2G) and UMTS (3G) wireless standards are deployed worldwide. Like the 4G standard now appearing, these standards provide for mobile devices with differing capabilities to roam between providers or technologies. This poses serious challenges in ensuring authentication and other security properties. Automated analysis of security properties is needed to cope with the large number of possible scenarios. While some attacks exploit weaknesses in cryptographic functions, many attacks exploit flaws or other features of the protocol design. The latter attacks can be found using symbolic (Dolev-Yao) models. This paper demonstrates the use of a fully automatic tool to exhaustively analyze symbolic models of GSM, UMTS, and the respective roaming protocols. The results include the demonstration of known attacks as well as the confirmation of expected properties.",
keywords = "GSM, Mobile networks, UMTS, authentication, automated analysis, roaming protocols, secrecy, security, symbolic modeling",
author = "Chunyu Tang and Naumann, {David A.} and Susanne Wetzel",
year = "2012",
doi = "10.1007/978-3-642-31909-9_29",
language = "English",
isbn = "9783642319082",
series = "Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering",
pages = "480--490",
booktitle = "Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, Revised Selected Papers",
note = "7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011 ; Conference date: 07-09-2011 Through 09-09-2011",
}