Merlin Chlosta

244 Followers
23 Following
26 Posts
private profile, not affiliated with my employer

Talk recording for our SIMurai talk at Usenix Security was just published:

https://www.youtube.com/watch?v=3_R9P--ksE4

USENIX Security '24 - SIMurai: Slicing Through the Complexity of SIM Card Security Research

YouTube
SOUPS 2024

YouTube
@ #SCCON Smart Country Convention in Berlin, Messe für "digitalen Staat"

Apple's "GDPR data download" used to be a nice way of pulling a full backup of iCloud, but appears broken* since a few months.

Is there any alternative for doing a full copy of iCloud?

*corrupted zip archives, extremely slow download speeds

Curious to learn more? Come visit our USENIX talk on Thursday afternoon (Session: Wireless Security I: Cellular and Bluetooth).

- Paper: https://usenix.org/conference/usenixsecurity24/presentation/lisowski
- PDF: https://www.usenix.org/system/files/usenixsecurity24-lisowski.pdf

- Code: https://github.com/tomasz-lisowski/simurai
- Artifact: https://github.com/tomasz-lisowski/simurai-usenixsec2024-ae

Great collaboration with Tomasz, Jinjin and Marius!

SIMurai: Slicing Through the Complexity of SIM Card Security Research | USENIX

Using SIMurai, we found two high-severity vulnerabilities, potentially allowing attackers to get code execution on a baseband.

But are hostile SIM cards a realistic threat model? To answer this, we provide two case studies: (a) a SIM spyware remotely provisioned by a rogue operator, and (b) triggering the found vulnerabilities via a modified SIM interposer, inserted by an attacker with physical access.

We also verified operationality of SIMurai by connecting it to 18 different phones and attaching to cellular networks (2G/4G/5G).

SIM cards can, for instance, ask your phone to open TCP channels, send SMS, or retrieve location information without user interaction.

To explore the attack surface we developed SIMurai, a research-focused SIM emulator, which can be plugged to physical and emulated phones alike.

Our #usenix2024 paper "SIMurai: Slicing Through the Complexity of SIM Card Security Research" just went public!

We asked ourselves: What kind of attacks could a hostile SIM launch against your phone?

Prüfbericht: Berlin schaltet Funkzellenabfragen-Transparenz-System ab

Berlin hat aufgehört, Betroffene über Funkzellenabfragen zu informieren, obwohl das gesetzlich vorgeschrieben ist. Zur Begründung hat der Justizsenat einen Bericht geschrieben, den wir veröffentlichen. Daraus wird klar: Das Transparenz-System funktioniert, aber die Regierung will es politisch nicht.

netzpolitik.org