BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:US/Eastern
BEGIN:DAYLIGHT
DTSTART:20190310T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20191103T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20190830T191912Z
UID:C62EAE3F-6C75-4851-8EBD-1FE84F327B31
DTSTART;TZID=US/Eastern:20190830T113000
DTEND;TZID=US/Eastern:20190830T123000
DESCRIPTION:The presentation is sponsored by:\n\nIEEE Rochester Section: Co
 mputer and Computational Intelligence Societies Joint Chapter\n\n(CS/CIS) 
 and RIT&#39;s GCCIS PhD Program.\n\nAbstract:\n\n4G/5G security is an emerging
  problem\, especially with IoT\, V2V\, UAV and other applications of advan
 ced wireless technology emerging. In order to understand the vulnerabiliti
 es of these networks\, we built a software radio testbed that models 4G LT
 E environments and developed a series of different cyber attacks to compro
 mise the LTE radio access network. Motivated by the fact that mobile netwo
 rks highly rely on control channel signaling\, we challenged the system pe
 rformance and availability by attacking individual LTE control channels an
 d signals. Moreover\, since user equipment (UEs) implicitly trust networks
  before the mutual authentication handshake is completed\, we tested the e
 ffect that fake base stations and fake signaling\, which we coin control c
 hannel spoofing\, have on the behavior UEs. After running numerous experim
 ents in controlled radio environments with standard compliant and mission 
 critical LTE networks and commercial UEs we found that a number of radio f
 requency attacks can cause serious damage to the network performance and a
 vailability. One of the simplest\, yet most severe attacks that can cause 
 denial of service is to transmit the LTE synchronization signals asynchron
 ously to those of legitimate networks. Fortunately\, there is a simple sol
 ution to this threat that all LTE UEs face. An important lesson learned fo
 r 5G development and deployment is that standards need to consider operati
 onal edge cases for which simple solutions may exist.\n\nCo-sponsored by: 
 RIT&#39;s GCCIS PhD Program\n\nSpeaker(s): Vuk Marojevic\, \n\nAgenda: \n11:30
  a.m. to 12:30 p.m. -- Presentation\n\nNote: no advance registration requi
 red\n\nRIT visitor parking suggestions:\n\n1) Stop at the welcome center a
 nd obtain visitor parking permit -- [[Google map](https://goo.gl/maps/KzoC
 pa2kdF82)]\n\n2) Then park at Visitor Parking in the E-lot -- [[Google map
 ](https://www.google.com/maps/place/RIT+Parking+Lot+E/@43.0858309\,-77.677
 4691\,18z/data=!4m14!1m8!3m7!1s0x0:0x0!2zNDPCsDA1JzA4LjMiTiA3N8KwNDAnNDcuM
 CJX!3b1!7e2!8m2!3d43.0856238!4d-77.6797202!3m4!1s0x89d14c8ab5d6bf75:0xf037
 6fec83a74df7!8m2!3d43.0868023!4d-77.6761783)]\n\nAdditional Links:\n\nIEEE
  meeting entry : https://events.vtools.ieee.org/m/202917\n\nCS/CIS website
  / venue info: http://ewh.ieee.org/r1/rochester/computer/\n\nVenue website
 : https://www.rit.edu/fa/gallery/\n\nflyer (printable): http://ewh.ieee.or
 g/r1/rochester/computer/2019/20190830/Marojevic.20190830.pdf\n\nRoom: Univ
 ersity Gallery\, Bldg: James E. Booth Hall - Bldg 7A\, RIT\, 152 Lomb Memo
 rial Dr. \, Rochester\, New York\, United States\, 14623
LOCATION:Room: University Gallery\, Bldg: James E. Booth Hall - Bldg 7A\, R
 IT\, 152 Lomb Memorial Dr. \, Rochester\, New York\, United States\, 14623
ORGANIZER:bo.yuan@rit.edu
SEQUENCE:8
SUMMARY:CS/CIS Event: Are 4G/5G Networks Vulnerable to Radio Signaling Atta
 cks?
URL;VALUE=URI:https://events.vtools.ieee.org/m/202917
X-ALT-DESC:Description: &lt;br /&gt;&lt;div style=&quot;margin: 15px\;&quot;&gt;\n&lt;div style=&quot;wid
 th: 780px\; background-color: #fff\; padding: 0px\;&quot;&gt;\n&lt;p&gt;The presentation
  is sponsored by:&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\; &lt;strong&gt;IEEE Rochester Sec
 tion:&amp;nbsp\;&lt;/strong&gt;&lt;strong&gt;Computer and Computational Intelligence Socie
 ties&lt;/strong&gt;&lt;strong&gt; Joint Chapter &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&amp;nbsp\;
 &amp;nbsp\; (&lt;span style=&quot;color: blue\;&quot;&gt;CS/CIS&lt;/span&gt;) and &lt;strong&gt;RIT&#39;s GCCI
 S PhD Program.&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;&lt;span style=
 &quot;text-decoration: underline\;&quot;&gt;Abstract:&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;\n&lt;p align=&quot;le
 ft&quot;&gt;4G/5G security is an emerging problem\, especially with IoT\, V2V\, UA
 V and other applications of advanced wireless technology emerging. In orde
 r to understand the vulnerabilities of these networks\, we built a softwar
 e radio testbed that models 4G LTE environments and developed a series of 
 different cyber attacks to compromise the LTE radio access network. Motiva
 ted by the fact that mobile networks highly rely on control channel signal
 ing\, we challenged the system performance and availability by attacking i
 ndividual LTE control channels and signals. Moreover\, since user equipmen
 t (UEs) implicitly trust networks before the mutual authentication handsha
 ke is completed\, we tested the effect that fake base stations and fake si
 gnaling\, which we coin control channel spoofing\, have on the behavior UE
 s. After running numerous experiments in controlled radio environments wit
 h standard compliant and mission critical LTE networks and commercial UEs 
 we found that a number of radio frequency attacks can cause serious damage
  to the network performance and availability. One of the simplest\, yet mo
 st severe attacks that can cause denial of service is to transmit the LTE 
 synchronization signals asynchronously to those of legitimate networks. Fo
 rtunately\, there is a simple solution to this threat that all LTE UEs fac
 e. An important lesson learned for 5G development and deployment is that s
 tandards need to consider operational edge cases for which simple solution
 s may exist.&lt;/p&gt;\n&lt;/div&gt;\n&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;11:30 a.m. to
  12:30 p.m. -- Presentation&lt;/p&gt;\n&lt;p&gt;Note: no advance registration required
 &lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;RIT visitor parking suggestions:&lt;/strong&gt;
 &lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\; 1) Stop at the welcome center and obtain vi
 sitor parking permit -- [&lt;a href=&quot;https://goo.gl/maps/KzoCpa2kdF82&quot; target
 =&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Google map&lt;/a&gt;]&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&amp;nbsp\;&amp;nbsp\; 2) 
 Then park at Visitor Parking in the E-lot -- [&lt;a href=&quot;https://www.google.
 com/maps/place/RIT+Parking+Lot+E/@43.0858309\,-77.6774691\,18z/data=!4m14!
 1m8!3m7!1s0x0:0x0!2zNDPCsDA1JzA4LjMiTiA3N8KwNDAnNDcuMCJX!3b1!7e2!8m2!3d43.
 0856238!4d-77.6797202!3m4!1s0x89d14c8ab5d6bf75:0xf0376fec83a74df7!8m2!3d43
 .0868023!4d-77.6761783&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Google map&lt;/a&gt;]&lt;/p&gt;
 \n&lt;p&gt;&lt;strong&gt;Additional Links:&lt;/strong&gt;&lt;/p&gt;\n&lt;p style=&quot;font-size: 11px\; f
 ont-family: Verdana\,Arial\,Helvetica\,sans-serif\; color: #000000\;&quot;&gt;&amp;nbs
 p\; &lt;strong&gt;IEEE meeting entry :&lt;/strong&gt;&amp;nbsp\;&lt;a title=&quot;IEEE vtools entr
 y&quot; href=&quot;https://events.vtools.ieee.org/m/202917&quot; target=&quot;_blank&quot; rel=&quot;noo
 pener&quot;&gt;https://events.vtools.ieee.org/m/202917&lt;/a&gt;&lt;/p&gt;\n&lt;div style=&quot;width:
  780px\; background-color: #fff\; padding: 0px\;&quot;&gt;\n&lt;p style=&quot;font-size: 1
 1px\; font-family: Verdana\,Arial\,Helvetica\,sans-serif\; color: #000000\
 ;&quot;&gt;&amp;nbsp\; &lt;strong&gt;CS/CIS website / venue info:&amp;nbsp\;&amp;nbsp\; &lt;/strong&gt;&lt;a 
 href=&quot;http://ewh.ieee.org/r1/rochester/computer/&quot; target=&quot;_blank&quot; rel=&quot;noo
 pener&quot;&gt;http://ewh.ieee.org/r1/rochester/computer/&lt;/a&gt;&lt;/p&gt;\n&lt;p style=&quot;font-
 size: 11px\; font-family: Verdana\,Arial\,Helvetica\,sans-serif\; color: #
 000000\;&quot;&gt;&lt;strong&gt;&amp;nbsp\;&amp;nbsp\;Venue website: &lt;/strong&gt;&lt;a href=&quot;https://w
 ww.rit.edu/fa/gallery/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;https://www.rit.edu
 /fa/gallery/&lt;/a&gt;&lt;/p&gt;\n&lt;p style=&quot;font-size: 11px\; font-family: Verdana\,Ar
 ial\,Helvetica\,sans-serif\; color: #000000\;&quot;&gt;&lt;strong&gt;&amp;nbsp\;&amp;nbsp\; flye
 r (printable): &lt;/strong&gt;&lt;a href=&quot;http://ewh.ieee.org/r1/rochester/computer
 /2019/20190830/Marojevic.20190830.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;http
 ://ewh.ieee.org/r1/rochester/computer/2019/20190830/Marojevic.20190830.pdf
 &lt;/a&gt;&lt;/p&gt;\n&lt;/div&gt;
END:VEVENT
END:VCALENDAR

