Hyunwoo Lee (Ohio State University), Haohuang Wen (Ohio State University), Phillip Porras (SRI), Vinod Yegneswaran (SRI), Ashish Gehani (SRI), Prakhar Sharma (SRI), Zhiqiang Lin (Ohio State University)

The fifth-generation (5G) cellular network has advanced significantly, becoming a crucial component of modern communication. However, there are still many inherent security vulnerabilities in the 5G network standard, which advocates continuous research and development efforts. To this end, there are various open-source 5G software and public testbeds for 5G network testing and research. While those tools are valuable, users with limited expertise often struggle to deploy a 5G network and conduct sophisticated security testing with these platforms. To fill this gap, we introduce MOBIDOJO, the first virtual 5G security testing platform that supports one-click 5G deployment and security testing with web-based graphical user interfaces. MOBIDOJO is built on entirely virtual (i.e., no radio hardware required) open-source software - the OpenAirInterface’s 5G stack deployed as Docker containers, making it compatible with any commodity servers. Another critical capability of MOBIDOJO is its attack simulation plugins that allow users to execute existing attacks or create custom Packet Capture (PCAP)-based 5G attack payloads and test them within an isolated 5G test network. We anticipate MOBIDOJO could drive many valuable applications, including education, Capture-the-Flag (CTF) competitions, 5G security research, defense evaluation, etc., ultimately helping to improve the transparency and security of 5G networks.

View More Papers

Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon

Xuanji Meng (Tsinghua University), Xiao Sui (Shandong University), Zhaoxin Yang (Tsinghua University), Kang Rong (Blockchain Platform Division,Ant Group), Wenbo Xu (Blockchain Platform Division,Ant Group), Shenglong Chen (Blockchain Platform Division,Ant Group), Ying Yan (Blockchain Platform Division,Ant Group), Sisi Duan (Tsinghua University)

Read More

Scale-MIA: A Scalable Model Inversion Attack against Secure Federated...

Shanghao Shi (Virginia Tech), Ning Wang (University of South Florida), Yang Xiao (University of Kentucky), Chaoyu Zhang (Virginia Tech), Yi Shi (Virginia Tech), Y. Thomas Hou (Virginia Polytechnic Institute and State University), Wenjing Lou (Virginia Polytechnic Institute and State University)

Read More

“Do We Call Them That? Absolutely Not.”: Juxtaposing the...

Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Luca Favaro (Technical University of Munich), and Florian Matthes (Technical University of Munich)

Read More

LeakLess: Selective Data Protection against Memory Leakage Attacks for...

Maryam Rostamipoor (Stony Brook University), Seyedhamed Ghavamnia (University of Connecticut), Michalis Polychronakis (Stony Brook University)

Read More