29.12.2024 –, Bühne HUFF
Sprache: English
CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled. The CellGuard app for iOS can uncover cellular attacks targeting your iPhone. It observes baseband packets and analyzes them for suspicious activities, hinting at fake base stations. Let’s catch them all!
A rogue base station, also called a fake base station, is a malicious network cell that tricks your phone into connecting to it. An attacker can use rogue base stations for various purposes, such as tracking a user’s location, intercepting network traffic, or even launching remote code execution attacks against the baseband chip’s firmware.
CellGuard can detect such fake base stations, even on non-jailbroken iPhones with the latest iOS version installed! In this presentation, you'll learn how to use it on your everyday device. Using CellGaurd, you can get various insights into the low layer communication of your phone's baseband chip.
Jiska Classen is a wireless and mobile security researcher at Hasso Plattner Institute. The intersection of these topics means that she digs into iOS internals, reverse engineers wireless firmware, and analyzes proprietary protocols. Her practical work on public Bluetooth security analysis tooling uncovered remote code execution and cryptographic flaws in billions of mobile devices. She also likes to work on obscure and upcoming wireless technologies, for example, she recently uncovered vulnerabilities in Ultra-wideband distance measurement and reverse engineered Apple's AirTag communication protocol.
She has previously spoken at Black Hat USA, DEF CON, RECon, hardwear.io, Chaos Communication Congress, Chaos Communication Camp, Gulasch Programmier Nacht, MRMCDs, Easterhegg, Troopers, Pass the Salt, NotPinkCon, gave various lectures and trainings, and published at prestigious academic venues.