Skip to content

Commit 99fc132

Browse files
Mostly done
1 parent 2bf8521 commit 99fc132

File tree

4 files changed

+71
-9
lines changed

4 files changed

+71
-9
lines changed

_pages/home.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -51,10 +51,3 @@ SysNetS Lab focuses on ensuring the security and privacy of wireless communicati
5151

5252
<!-- We are grateful for funding from Leiden University, [NWO](www.nwo.nl) ([Vidi talent scheme](http://www.nwo.nl/en/research-and-results/programmes/Talent+Scheme) and the [Frontiers in Nanoscience program](https://www.universiteitleiden.nl/en/research/research-projects/science/frontiers-of-nanoscience-nanofront)), and from an [ERC starting grant](https://erc.europa.eu/funding/starting-grants). -->
5353

54-
<figure class="fourth">
55-
56-
<a href="https://www.utdallas.edu/" target="_blank"><img src="{{ site.url }}{{ site.baseurl }}/images/logopic/utd_line.jpg" style="width: 650px" alt="The University of Texas at Dallas"></a>
57-
<!-- <a href="https://www.nsf.gov/" target="_blank"><img src="{{ site.url }}{{ site.baseurl }}/images/logopic/nsf.jfif" style="width: 200px" alt="National Science Foundation"></a> -->
58-
<!-- <a href="https://cqn-erc.org/" target="_blank"><img src="{{ site.url }}{{ site.baseurl }}/images/logopic/cqn.png" style="width: 200px" alt="Center for Quantum Networks"></a> -->
59-
60-
</figure>

_pages/home_saved.md

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
---
2+
title: "SysNetS Lab - Home"
3+
layout: homelay
4+
excerpt: "SysNetS Lab @ UTD"
5+
sitemap: true
6+
permalink: /
7+
---
8+
9+
System and Network Security (SysNetS) lab is part of the Department of Computer Science at the<a href="https://www.utdallas.edu/" target="_blank"> University of Texas at Dallas <i class="fa fa-external-link"></i></a> lead by PI: <a href="https://www.imtiazkarim.net/" target="_blank"> Imtiaz Karim <i class="fa fa-external-link"></i></a>.
10+
11+
12+
<div markdown="0" id="carousel" class="carousel slide" data-ride="carousel" data-interval="4000" data-pause="hover" >
13+
<!-- Menu -->
14+
<ol class="carousel-indicators">
15+
<li data-target="#carousel" data-slide-to="0" class="active"></li>
16+
<li data-target="#carousel" data-slide-to="1"></li>
17+
</ol>
18+
19+
<!-- Items -->
20+
<div class="carousel-inner" markdown="0">
21+
<div class="item active">
22+
<a href="{{ site.url }}{{ site.baseurl }}/publications"><img src="{{ site.url }}{{ site.baseurl }}/images/slider7001400/5g.gif" alt="5G" /></a>
23+
</div>
24+
<div class="item">
25+
<a href="{{ site.url }}{{ site.baseurl }}/publications"><img src="{{ site.url }}{{ site.baseurl }}/images/slider7001400/timesafe.png" alt="TIMESAFE" /></a>
26+
</div>
27+
<div class="item">
28+
<a href="{{ site.url }}{{ site.baseurl }}/publications"><img src="{{ site.url }}{{ site.baseurl }}/images/slider7001400/spec5g.png" alt="SPEC5G" /></a>
29+
</div>
30+
<div class="item">
31+
<a href="{{ site.url }}{{ site.baseurl }}/publications"><img src="{{ site.url }}{{ site.baseurl }}/images/slider7001400/FBSDetector.png" alt="Fake Base Station Detection" /></a>
32+
</div>
33+
</div>
34+
35+
<a class="left carousel-control" href="#carousel" role="button" data-slide="prev">
36+
<span class="glyphicon glyphicon-chevron-left" aria-hidden="true"></span>
37+
<span class="sr-only">Previous</span>
38+
</a>
39+
<a class="right carousel-control" href="#carousel" role="button" data-slide="next">
40+
<span class="glyphicon glyphicon-chevron-right" aria-hidden="true"></span>
41+
<span class="sr-only">Next</span>
42+
</a>
43+
</div>
44+
45+
46+
SysNetS Lab focuses on ensuring the security and privacy of wireless communication protocols (e.g., cellular networks-4G/5G, Bluetooth, VoWiFi, vehicular, WiFi, and IoT) with respect to their design and implementation. The aim is to develop tools that systematically analyze real-world systems and widely used protocols using formal verification, program analysis, machine learning, natural language processing, and software testing techniques. Furthermore, with the advent of the next generation of networks (6G and beyond), the lab's future goal is to ensure the resilience (reliability, adaptability, and security) of future network generations and develop protocols and systems that are robust and secure by design (see [Research](research)).
47+
48+
49+
**We are looking for passionate Ph.D. Master's and Bachelor's students at UTD to join the team** [(more info)]({{ site.url }}{{ site.baseurl }}/vacancies) **!**
50+
51+
52+
<!-- We are grateful for funding from Leiden University, [NWO](www.nwo.nl) ([Vidi talent scheme](http://www.nwo.nl/en/research-and-results/programmes/Talent+Scheme) and the [Frontiers in Nanoscience program](https://www.universiteitleiden.nl/en/research/research-projects/science/frontiers-of-nanoscience-nanofront)), and from an [ERC starting grant](https://erc.europa.eu/funding/starting-grants). -->
53+
54+
<figure>
55+
56+
<a href="https://www.utdallas.edu/" target="_blank"><img src="{{ site.url }}{{ site.baseurl }}/images/logopic/utd_line.jpg" style="width: 600px" alt="The University of Texas at Dallas"></a>
57+
<!-- <a href="https://www.nsf.gov/" target="_blank"><img src="{{ site.url }}{{ site.baseurl }}/images/logopic/nsf.jfif" style="width: 200px" alt="National Science Foundation"></a> -->
58+
<!-- <a href="https://cqn-erc.org/" target="_blank"><img src="{{ site.url }}{{ site.baseurl }}/images/logopic/cqn.png" style="width: 200px" alt="Center for Quantum Networks"></a> -->
59+
60+
</figure>

_pages/research.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,11 +29,20 @@ To reduce such manual effort, in this paper, we curate SPEC5G the first-ever pub
2929
## Secure Protocol Design and Defense:
3030

3131
### TIMESAFE: Timing Interruption Monitoring and Security Assessment for Fronthaul Environments (arXiv 2024)
32-
33-
5G and beyond cellular systems embrace the disaggregation of Radio Access Network (RAN) components, exemplified by the evolution of the fronthual (FH) connection between cellular baseband and radio unit equipment. Crucially, synchronization over the FH is pivotal for reliable 5G services. In recent years, there has been a push to move these links to an Ethernet-based packet network topology, leveraging existing standards and ongoing research for Time-Sensitive Networking (TSN). However, TSN standards, such as Precision Time Protocol (PTP), focus on performance with little to no concern for security. This increases the exposure of the open FH to security risks. Attacks targeting synchronization mechanisms pose significant threats, potentially disrupting 5G networks and impairing connectivity.
3432
![]({{ site.url }}{{ site.baseurl }}/images/respic/timesafe.png){: style="width: 450px; float: left; margin: 5px 15px 0px 0px;"}
33+
5G and beyond cellular systems embrace the disaggregation of Radio Access Network (RAN) components, exemplified by the evolution of the fronthual (FH) connection between cellular baseband and radio unit equipment. Crucially, synchronization over the FH is pivotal for reliable 5G services. In recent years, there has been a push to move these links to an Ethernet-based packet network topology, leveraging existing standards and ongoing research for Time-Sensitive Networking (TSN). However, TSN standards, such as Precision Time Protocol (PTP), focus on performance with little to no concern for security. This increases the exposure of the open FH to security risks. Attacks targeting synchronization mechanisms pose significant threats, potentially disrupting 5G networks and impairing connectivity.
34+
3535
In this paper, we demonstrate the impact of successful spoofing and replay attacks against PTP synchronization. We show how a spoofing attack is able to cause a production-ready O-RAN and 5G-compliant private cellular base station to catastrophically fail within 2 seconds of the attack, necessitating manual intervention to restore full network operations. To counter this, we design a Machine Learning (ML)-based monitoring solution capable of detecting various malicious attacks with over 97.5% accuracy.
3636

37+
38+
39+
## Gotta Detect ’Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks (Usenix Security 2025A)
40+
Fake base stations (FBSes) pose a significant security threat by impersonating legitimate base stations (BSes). Though efforts have been made to defeat this threat, up to this day, the presence of FBSes and the multi-step attacks (MSAs) stemming from them can lead to unauthorized surveillance, interception of sensitive information, and disruption of network services. Therefore, detecting these malicious entities is crucial to ensure the security and reliability of cellular networks. Traditional detection methods often rely on additional hardware, predefined rules, signal scanning, changes to protocol specifications, or cryptographic mechanisms that have limitations and incur huge infrastructure costs in accurately identifying FBSes. In this paper, we develop FBSDetector–an effective and efficient detection solution that can reliably detect FBSes and MSAs from layer-3 network traces using machine learning (ML) at the user equipment (UE) side.
41+
![]({{ site.url }}{{ site.baseurl }}/images/respic/FBSDetector.png){: style="width: 950px; float: left; margin: 5px 15px 0px 0px;"}
42+
To develop FBSDetector, we create FBSAD and MSAD, the first-ever high-quality and large-scale datasets incorporating instances of FBSes and 21 MSAs. These datasets capture the network traces in different real-world cellular network scenarios (including mobility and different attacker capabilities) incorporating legitimate BSes and FBSes. Our novel ML framework, specifically designed to detect FBSes in a multi-level approach for packet classification using stateful LSTM with attention and trace level classification and MSAs using graph learning, can effectively detect FBSes with an accuracy of 96% and a false positive rate of 2.96%, and recognize MSAs with an accuracy of 86% and a false positive rate of 3.28%. We deploy FBSDetector as a real-world solution to protect end-users through a mobile app and validate it in real-world environments. Compared to the existing heuristic-based solutions that fail to detect FBSes, FBSDetector can detect FBSes in the wild in real time.
43+
44+
45+
3746
**Protocol noncompliance checking**
3847

3948

images/respic/FBSDetector.png

248 KB
Loading

0 commit comments

Comments
 (0)