Sept. 14, 2022, 1:20 a.m. | Reza Soosahabi (1 and 2), Magdy Bayoumi (2) ((1) Keysight Technologies Inc., (2) University of Louisiana at Lafayette)

cs.CR updates on arXiv.org arxiv.org

In this work, we propose a novel framework to identify and mitigate a
recently disclosed covert channel scheme exploiting unprotected broadcast
messages in cellular MAC layer protocols. Examples of covert channel are used
in data exfiltration, remote command-and-control (CnC) and espionage.
Responsibly disclosed to GSMA (CVD-2021-0045), the SPARROW covert channel
scheme exploits the downlink power of LTE/5G base-stations that broadcast
contention resolution identity (CRI) from any anonymous device according to the
3GPP standards. Thus, the SPARROW devices can covertly relay …

beyond channel covert covert channel exploitation mac

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Transfer GMP Compliance Officer

@ Pharmathen | Sapes, East Macedonia and Thrace, Greece

Security Cyber Consultant DRC (m/w/d)

@ Atos | Berlin, DE, D-13353

Penetration Tester - InfoSec

@ Rapid7 | NIS Belfast

Cyber Vulnerability Lead

@ Under Armour | Remote, US