Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ravishankar Borgaonkar is active.

Publication


Featured researches published by Ravishankar Borgaonkar.


computer and communications security | 2012

New privacy issues in mobile telephony: fix and verification

Myrto Arapinis; Loretta Ilaria Mancini; Eike Ritter; Mark Ryan; Nico Golde; Kevin Redon; Ravishankar Borgaonkar

Mobile telephony equipment is daily carried by billions of subscribers everywhere they go. Avoiding linkability of subscribers by third parties, and protecting the privacy of those subscribers is one of the goals of mobile telecommunication protocols. We use formal methods to model and analyse the security properties of 3G protocols. We expose two novel threats to the user privacy in 3G telephony systems, which make it possible to trace and identify mobile telephony subscribers, and we demonstrate the feasibility of a low cost implementation of these attacks. We propose fixes to these privacy issues, which also take into account and solve other privacy attacks known from the literature. We successfully prove that our privacy-friendly fixes satisfy the desired unlinkability and anonymity properties using the automatic verification tool ProVerif.


international conference on detection of intrusions and malware and vulnerability assessment | 2013

SMS-based one-time passwords: attacks and defense

Collin Mulliner; Ravishankar Borgaonkar; Patrick Stewin; Jean-Pierre Seifert

SMS-based One-Time Passwords (SMS OTP) were introduced to counter phishing and other attacks against Internet services such as online banking. Today, SMS OTPs are commonly used for authentication and authorization for many different applications. Recently, SMS OTPs have come under heavy attack, especially by smartphone Trojans. In this paper, we analyze the security architecture of SMS OTP systems and study attacks that pose a threat to Internet-based authentication and authorization services. We determined that the two foundations SMS OTP is built on, cellular networks and mobile handsets, were completely different at the time when SMS OTP was designed and introduced. Throughout this work, we show why SMS OTP systems cannot be considered secure anymore. Based on our findings, we propose mechanisms to secure SMS OTPs against common attacks and specifically against smartphone Trojans.


security of information and networks | 2011

Security analysis of a femtocell device

Ravishankar Borgaonkar; Kevin Redon; Jean-Pierre Seifert

Mobile network operators are adapting femtocells in order to simplify their network architecture for increased coverage, performance, and greater revenue opportunities. While emerging as a new low-cost technology which assures best connectivity, it has also introduced a range of new potential security risks for the mobile network operators. In this paper, we analyze these security issues and demonstrate the weaknesses of femtocell security. We demonstrate several security flaws that allowing attackers to gain root access and to install malicious applications on the femtocell. Furthermore, we experimentally evaluate and show a wide range of possible threats to femtocell; including compromise of femtocell credentials; physical, configuration, and protocol attacks; user data and identity privacy attacks. The vulnerabilities we found suggest that commercial-available femtocells fail to fulfill 3GPP security requirements and could expose operator network elements to the attacker. Our findings and successful attacks exhibit the need for further research to bridge the gap between theoretical and practical security of femtocell devices.


international conference on intelligence in next generation networks | 2010

Operator-based over-the-air M2M wireless sensor network security

Sachin Agarwal; Christoph Peylo; Ravishankar Borgaonkar; Jean-Pierre Seifert

We describe a novel method for over-the-air automated authentication and verification of machine-to-machine (M2M) wireless sensor networks using the existing authentication assets of a cellular telecom operator. We extend the standard Generic Bootstrapping Architecture (GBA) provided in the 3GPP specifications to implement our solution with minimal additional hardware and software requirements.


nordic conference on secure it systems | 2009

Security Usability of Petname Systems

Md. Sadek Ferdous; Audun Jøsang; Kuldeep Singh; Ravishankar Borgaonkar

To have certainty about identities is crucial for secure communication in digital environments. The number of digital identities that people and organizations need to manage is rapidly increasing, and proper management of these identities is essential for maintaining security in online markets and communities. Traditional Identity Management Systems are designed to facilitate the management of identities from the perspective of the service provider, but provide little support on the user side. The difficulty of managing identities on the user side causes vulnerabilities that open up for serious attacks such as identity theft and Phishing. Petname Systems have been proposed to provide more user friendly and secure identity management on the user side. This paper provides an analysis of the Petname Model by describing its history and background, properties, application domains and usability issues with emphasis on Security Usability. By covering a broad set of aspects, this paper is intended to provide a comprehensive reference for the Petname System.


nordic conference on secure it systems | 2010

Experimental analysis of the femtocell location verification techniques

Ravishankar Borgaonkar; Kevin Redon; Jean-Pierre Seifert

Mobile network operators are adapting femtocells in order to simplify their network architecture for increased performance and greater revenue opportunities. While emerging as a new low-cost technology which assures best connectivity, it has also introduced a range of new potential risks for the mobile network operators. Here we study the risks associated with the location verification techniques of femtocells. First we state the goals of location verification and describe techniques implemented in the existing femtocells. We demonstrate how location locking techniques can be defeated by using modern attack vectors against the location verification methods. Our experimental result suggest that location security methods are insufficient to avoid femtocells misuse. An attacker can operates the femtocell from an unregistered location, thereby creating problems for various important services such as for assisting emergency call services, for following licensed spectrum rules, for Lawful interception services, and for the commercial purposes.


security of information and networks | 2009

Spam filter optimality based on signal detection theory

Singh Kuldeep; Jøsang Audun; Md. Sadek Ferdous; Ravishankar Borgaonkar

Unsolicited bulk email, commonly known as spam, represents a significant problem on the Internet. The seriousness of the situation is reflected by the fact that approximately 97% of the total e-mail traffic currently (2009) is spam. To fight this problem, various anti-spam methods have been proposed and are implemented to filter out spam before it gets delivered to recipients, but none of these methods are entirely satisfactory. In this paper we analyze the properties of spam filters from the viewpoint of Signal Detection Theory (SDT). The Bayesian approach of Signal Detection Theory provides a basis for determining the optimality of spam filters, i.e. whether they provide positive utility to users. In the process of decision making by a spam filter various tradeoffs are considered as a function of the costs of incorrect decisions and the benefits of correct decisions.


network and distributed system security symposium | 2012

Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications.

Nico Golde; Kevin Redon; Ravishankar Borgaonkar


network and distributed system security symposium | 2016

Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems.

Altaf Shaik; Ravishankar Borgaonkar; N. Asokan; Valtteri Niemi; Jean-Pierre Seifert


Workshop on Security of Emerging Networking Technologies | 2014

Cellpot: A Concept for Next Generation Cellular Network Honeypots

Steffen Liebergeld; Matthias Lange; Ravishankar Borgaonkar

Collaboration


Dive into the Ravishankar Borgaonkar's collaboration.

Top Co-Authors

Avatar

Jean-Pierre Seifert

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Kevin Redon

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Nico Golde

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Patrick Stewin

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Matthias Lange

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Steffen Liebergeld

Technical University of Berlin

View shared research outputs
Researchain Logo
Decentralizing Knowledge