CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications
Abstract: In recent years, there has been a growing focus on scrutinizing the security of cellular networks, often attributing security vulnerabilities to issues in the underlying protocol design descriptions. These protocol design specifications, typically extensive documents that are thousands of pages long, can harbor inaccuracies, underspecifications, implicit assumptions, and internal inconsistencies. In light of the evolving landscape, we introduce CellularLint--a semi-automatic framework for inconsistency detection within the standards of 4G and 5G, capitalizing on a suite of natural language processing techniques. Our proposed method uses a revamped few-shot learning mechanism on domain-adapted LLMs. Pre-trained on a vast corpus of cellular network protocols, this method enables CellularLint to simultaneously detect inconsistencies at various levels of semantics and practical use cases. In doing so, CellularLint significantly advances the automated analysis of protocol specifications in a scalable fashion. In our investigation, we focused on the Non-Access Stratum (NAS) and the security specifications of 4G and 5G networks, ultimately uncovering 157 inconsistencies with 82.67% accuracy. After verification of these inconsistencies on open-source implementations and 17 commercial devices, we confirm that they indeed have a substantial impact on design decisions, potentially leading to concerns related to privacy, integrity, availability, and interoperability.
- Baseband attacks: Remote exploitation of memory corruptions in cellular protocol stacks. In WOOT, 2012.
- https://www.3gpp.org/.
- 5G Security Architecture, 2023. https://www.etsi.org/deliver/etsi_ts/133500_133599/133501/17.05.00_60/ts_133501v170500p.pdf.
- Ericsson, 2023. https://www.ericsson.com/en/reports-and-papers/mobility-report/dataforecasts/mobile-subscriptions-outlook.
- Global Mobile Suppliers Association, 2023. https://gsacom.com/paper/5g-subscribers-march-2023-update/.
- Huggingface Transformers, 2023. https://huggingface.co/docs/transformers/index.
- LTE Security Architecture, 2023. https://www.etsi.org/deliver/etsi_ts/133400_133499/133401/17.01.00_60/ts_133401v170100p.pdf.
- Non-Access-Stratum (NAS) protocol for 5G System (5GS), 2023. https://www.etsi.org/deliver/etsi_ts/124500_124599/124501/17.07.01_60/ts_124501v170701p.pdf.
- Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS), 2023. https://www.etsi.org/deliver/etsi_ts/124300_124399/124301/17.06.00_60/ts_124301v170600p.pdf.
- https://www.open5gs.org/.
- OpenAirInterface | 5G software alliance for democratising wireless innovation, 2023. https://www.openairinterface.org.
- SrsRAN Project, 2023. https://www.srslte.com/5g.
- CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications, 2024. https://cellularlint.github.io/.
- PolicyLint: Investigating internal privacy policy contradictions on google play. In USENIX Security, 2019.
- Actions speak louder than words: Entity-Sensitive privacy policy and data flow analysis with PoliCheck. In USENIX Security, 2020.
- Daniele Antonioli. Bluffs: Bluetooth forward and future secrecy attacks and defenses. In Proc. of CCS, 2023.
- Ue security reloaded: Developing a 5g standalone user-side security testing framework. In Proc. of ACM WiSec, 2023.
- A large annotated corpus for learning natural language inference. In Proc. of EMNLP, 2015.
- Language models are few-shot learners. Advances in NeurIPS, 2020.
- Universal sentence encoder for English. In Proc. of EMNLP: System Demonstrations, 2018.
- LEGAL-BERT: The muppets straight out of law school. In Findings of EMNLP, 2020.
- Sherlock on specs: Building LTE conformance tests through automated reasoning. In USENIX Security, 2023.
- Seeing the forest for the trees: Understanding security hazards in the 3GPP ecosystem through intelligent analysis on change requests. In USENIX Security, 2022.
- Bookworm game: Automatic discovery of lte vulnerabilities through documentation analysis. In IEEE Security and Privacy (SP), 2021.
- Lte security disabled: Misconfiguration in commercial networks. In Proc. of WiSec, 2019.
- Component-based formal analysis of 5g-aka: Channel assumptions and session confusion. In NDSS, 2019.
- BERT: pre-training of deep bidirectional transformers for language understanding. CoRR, abs/1810.04805, 2018.
- D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, 1983.
- Active learning for bert: an empirical study. In Proc. of EMNLP, 2020.
- Making pre-trained language models better few-shot learners. In Proc. of ACL-IJCNLP (Volume 1: Long Papers), 2021.
- Domain-specific language model pretraining for biomedical natural language processing. ACM Transactions on Computing for Healthcare (HEALTH), 2021.
- Guti reallocation demystified: Cellular location tracking with changing temporary identifier. In NDSS Symposium, 2018.
- OCNLI: Original Chinese Natural Language Inference. In Findings of EMNLP, 2020.
- Lteinspector: A systematic approach for adversarial testing of 4g lte. In NDSS Symposium, 2018.
- Privacy attacks to the 4g and 5g cellular paging protocols using side channel information. Proc. of NDSS Symposium, 2019.
- 5greasoner: A property-directed security and privacy analysis framework for 5g cellular network protocol. In Proc. of ACM CCS, 2019.
- Noncompliance as deviant behavior: An automated black-box noncompliance checker for 4g lte cellular devices. In Proc. of CCS, 2021.
- Distance-based self-attention network for natural language inference. arXiv preprint arXiv:1712.02047, 2017.
- Hermes: Unlocking security analysis of cellular network protocols by synthesizing finite state machines from natural language specifications, 2023.
- Never let me down again: Bidding-down attacks and mitigations in 5g and 4g. In Proc. of WiSec, 2023.
- Spec5g: A dataset for 5g cellular network protocol analysis. In Proc. of IJCNLP-AACL, 2023.
- Basespec: Comparative analysis of baseband software and cellular specifications for l3 protocols. Proc. of NDSS Symposium, 2021.
- Breaking and fixing volte: Exploiting hidden data channels and mis-implementations. In Proc. of CCS, 2015.
- Touching the untouchables: Dynamic security analysis of the lte control plane. In IEEE Security and Privacy (SP), 2019.
- Instructions unclear: Undefined behaviour in cellular network specifications. In USENIX Security, 2023.
- Distributed representations of sentences and documents. In Eric P. Xing and Tony Jebara, editors, Proc. of ICML, 2014.
- Insecurity of voice solution volte in lte mobile networks. In Proc. of CCS, 2015.
- Roberta: A robustly optimized BERT pretraining approach. CoRR, abs/1907.11692, 2019.
- Basesafe: Baseband sanitized fuzzing through emulation. In Proc. of WiSec, 2020.
- Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781, 2013.
- Robert Munro Monarch. Human-in-the-Loop Machine Learning: Active learning and annotation for human-centered AI. Simon and Schuster, 2021.
- Automated attack synthesis by extracting finite state machines from protocol specification documents. In IEEE Security and Privacy (SP), 2022.
- overshadowt: In-depth downlink negative testing framework for LTE devices. In USENIX Security, 2022.
- Med-bert: pretrained contextualized embeddings on large-scale structured electronic health records for disease prediction. NPJ digital medicine, 2021.
- Sentence-BERT: Sentence embeddings using Siamese BERT-networks. In Proc. of EMNLP-IJCNLP, 2019.
- Imp4gt: Impersonation attacks in 4g networks. In ISOC NDSS, 2020.
- Scinli: A corpus for natural language inference on scientific text, 2022.
- Towards contradiction detection in german: a translation-driven approach. In IEEE SSCI, 2019.
- Karen Sparck Jones. A statistical interpretation of term specificity and its application in retrieval. Journal of documentation, 1972.
- Attention is all you need. Advances in NeurIPS, 2017.
- EDA: Easy data augmentation techniques for boosting performance on text classification tasks. In Proc. of EMNLP-IJCNLP, 2019.
- Transformers: State-of-the-art natural language processing. In Proc. of EMNLP: System Demonstrations, 2020.
- Hiding in plain signal: Physical signal overshadowing attack on LTE. In USENIX Security, 2019.
- Xlnet: Generalized autoregressive pretraining for language understanding. Advances in NeurIPS, 2019.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.