Skip to main content

An Empirical Study of Wireless Carrier Authentication for SIM Swaps

Author(s): Lee, Kevin; Kaiser, Benjamin; Mayer, Jonathan; Narayanan, Arvind

Download
To refer to this page use: http://arks.princeton.edu/ark:/88435/pr1qk1t
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLee, Kevin-
dc.contributor.authorKaiser, Benjamin-
dc.contributor.authorMayer, Jonathan-
dc.contributor.authorNarayanan, Arvind-
dc.date.accessioned2021-10-08T19:51:10Z-
dc.date.available2021-10-08T19:51:10Z-
dc.date.issued2020en_US
dc.identifier.citationLee, Kevin, Benjamin Kaiser, Jonathan Mayer, and Arvind Narayanan. "An Empirical Study of Wireless Carrier Authentication for {SIM} Swaps." In Sixteenth Symposium on Usable Privacy and Security (2020): pp. 61-79.en_US
dc.identifier.urihttps://www.usenix.org/conference/soups2020/presentation/lee-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/pr1qk1t-
dc.description.abstractWe examined the authentication procedures used by five prepaid wireless carriers when a customer attempted to change their SIM card. These procedures are an important line of defense against attackers who seek to hijack victims’ phone numbers by posing as the victim and calling the carrier to request that service be transferred to a SIM card the attacker possesses. We found that all five carriers used insecure authentication challenges that could be easily subverted by attackers. We also found that attackers generally only needed to target the most vulnerable authentication challenges, because the rest could be bypassed. Authentication of SIM swap requests presents a classic usability-security trade-off, with carriers underemphasizing security. In an anecdotal evaluation of postpaid accounts at three carriers, presented in Appendix A, we also found—very tentatively—that some carriers may have implemented stronger authentication for postpaid accounts than for prepaid accounts. To quantify the downstream effects of these vulnerabilities, we reverse-engineered the authentication policies of over 140 websites that offer phone-based authentication. We rated the level of vulnerability of users of each website to a SIM swap attack, and have released our findings as an annotated dataset on issms2fasecure.com. Notably, we found 17 websites on which user accounts can be compromised based on a SIM swap alone, i.e., without a password compromise. We encountered failures in vulnerability disclosure processes that resulted in these vulnerabilities remaining unfixed by nine of the 17 companies despite our responsible disclosure. Finally, we analyzed enterprise MFA solutions from three vendors, finding that two of them give users inadequate control over the security-usability tradeoff.en_US
dc.format.extent61 - 79en_US
dc.language.isoen_USen_US
dc.relation.ispartofSixteenth Symposium on Usable Privacy and Securityen_US
dc.rightsFinal published version. This is an open access article.en_US
dc.titleAn Empirical Study of Wireless Carrier Authentication for SIM Swapsen_US
dc.typeConference Articleen_US
pu.type.symplectichttp://www.symplectic.co.uk/publications/atom-terms/1.0/conference-proceedingen_US

Files in This Item:
File Description SizeFormat 
WirelessCarrier.pdf440.6 kBAdobe PDFView/Download


Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.