We introduce LTrack, a new tracking attack on LTE that allows an attacker to stealthily extract user devices' (UEs) permanent identifiers (IMSI) and locations. To remain stealthy, the localization of UEs in LTrack is fully passive. It relies on our new uplink/downlink sniffer implementation, which records both times of arrivals of LTE messages and contents of Timing Advance commands, based on which LTrack calculates UE locations. LTrack is the first to show the feasibility of passive UE's localization through an implementation on a software-defined radio. Passive localization attacks reveal information about a UE's locations but can at best link these locations to a UE's pseudonymous temporary identifier (TMSI), making tracking in dense areas challenging. LTrack overcomes this challenge by introducing and implementing a new type of IMSI Catcher named IMSI Extractor. It extracts a UE's permanent identifier (IMSI) and binds it to its current TMSI. Instead of relying on fake base stations like existing IMSI Catchers (which are detectable due to their output power), IMSI Extractor relies on our uplink/downlink sniffer enhanced with surgical message overshadowing. This makes our IMSI Extractor the stealthiest IMSI Catcher to date. We evaluate LTrack through a series of experiments and show that in line-of-sight conditions, the attacker can estimate the location of a phone with less than 6m error in 90 of the cases. In addition, we successfully test our IMSI Extractor against a set of 17 modern smartphones connected to an industry-grade LTE testbed.
翻译:我们引入了Ltrack, 这是一种针对LTE的新的跟踪攻击, 使攻击者能够悄悄地提取用户设备( UES) 永久识别器( IMSI) 和位置。 为了保持隐蔽性, Ltrack 中的UES 本地化是完全被动的。 它依赖于我们新的上链/ 下链路嗅探器的实施, 记录LTE 信息到达的时间和Timing Sach 命令的内容, 由 Ltrack 计算 UE 位置。 Ltrack 是第一个通过在软件定义的收音器上安装一个自动显示UE 本地化的可行性。 被动本地化攻击显示有关 UE 位置的信息, 但最好将这些位置与 UE 的虚拟临时识别器( TMSI 本地化) 本地化连接起来, 从而在密集地区进行追踪。 LMSI Catchercruper 引入并使用新型的IMIS IMIS 服务器来克服这一挑战。 它提取了一个永久识别器的17 IMSI, 并且将它与当前的 TMSI 连接连接连接连接起来。 而不是依靠现有的IMSI IMIS IMIS 服务器 服务器 的变压,, 通过IMIS 升级的IMIS 的服务器 显示一个升级的IMIS 。