summaryrefslogtreecommitdiffstats
path: root/Tex/Master/Master.aux
diff options
context:
space:
mode:
Diffstat (limited to 'Tex/Master/Master.aux')
-rw-r--r--Tex/Master/Master.aux197
1 files changed, 102 insertions, 95 deletions
diff --git a/Tex/Master/Master.aux b/Tex/Master/Master.aux
index 7e500b9..28872c7 100644
--- a/Tex/Master/Master.aux
+++ b/Tex/Master/Master.aux
@@ -244,62 +244,67 @@
\newlabel{sec:info_gathering}{{3.2.1}{43}}
\citation{GSM2009}
\citation{GSM2009}
+\citation{protocols1999}
+\citation{protocols1999}
+\citation{protocols1999}
\@writefile{lot}{\contentsline {table}{\numberline {3.2}{\ignorespaces Type Codes and the corresponding System Information Types \cite {GSM2009}.}}{44}}
\newlabel{tab:tc_mapping}{{3.2}{44}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.2}Information Evaluation}{45}}
-\newlabel{sec:info_evaluation}{{3.2.2}{45}}
-\@writefile{lot}{\contentsline {table}{\numberline {3.3}{\ignorespaces Configuration Rules implemented inside the ICDS.}}{46}}
-\newlabel{tab:config_rules}{{3.3}{46}}
-\@writefile{lot}{\contentsline {table}{\numberline {3.4}{\ignorespaces Context Rules implemented inside the ICDS.}}{47}}
-\newlabel{tab:context_rules}{{3.4}{47}}
-\FN@pp@footnote@aux{11}{47}
-\@writefile{toc}{\contentsline {subsubsection}{Neighbourhood Structure}{47}}
-\FN@pp@footnote@aux{12}{48}
-\@writefile{toc}{\contentsline {subsubsection}{Base Station Evaluation}{48}}
-\@writefile{lof}{\contentsline {figure}{\numberline {3.3}{\ignorespaces Base stations and their neighbourhood connections at the Technische Fakult\"at.}}{49}}
-\newlabel{fig:neighbourhood_example}{{3.3}{49}}
-\@writefile{lof}{\contentsline {figure}{\numberline {3.4}{\ignorespaces Comparison between a normal neighbourhood subgraph and a tainted one.}}{49}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {Normal neighbourhood}}}{49}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Tainted neighbourhood}}}{49}}
-\newlabel{fig:structure_comparison}{{3.4}{49}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.3}Forged Parameters}{50}}
-\newlabel{sec:fake_parameters}{{3.2.3}{50}}
+\@writefile{lof}{\contentsline {figure}{\numberline {3.3}{\ignorespaces System Information 1 Message \cite {protocols1999}.}}{45}}
+\newlabel{fig:si1}{{3.3}{45}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.2}Information Evaluation}{46}}
+\newlabel{sec:info_evaluation}{{3.2.2}{46}}
+\@writefile{lot}{\contentsline {table}{\numberline {3.3}{\ignorespaces Configuration Rules implemented inside the ICDS.}}{47}}
+\newlabel{tab:config_rules}{{3.3}{47}}
+\@writefile{lot}{\contentsline {table}{\numberline {3.4}{\ignorespaces Context Rules implemented inside the ICDS.}}{48}}
+\newlabel{tab:context_rules}{{3.4}{48}}
+\FN@pp@footnote@aux{11}{48}
+\@writefile{toc}{\contentsline {subsubsection}{Neighbourhood Structure}{48}}
+\FN@pp@footnote@aux{12}{49}
+\@writefile{toc}{\contentsline {subsubsection}{Base Station Evaluation}{49}}
+\@writefile{lof}{\contentsline {figure}{\numberline {3.4}{\ignorespaces Base stations and their neighbourhood connections at the Technische Fakult\"at.}}{50}}
+\newlabel{fig:neighbourhood_example}{{3.4}{50}}
+\@writefile{lof}{\contentsline {figure}{\numberline {3.5}{\ignorespaces Comparison between a normal neighbourhood subgraph and a tainted one.}}{50}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {Normal neighbourhood}}}{50}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Tainted neighbourhood}}}{50}}
+\newlabel{fig:structure_comparison}{{3.5}{50}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.3}Forged Parameters}{51}}
+\newlabel{sec:fake_parameters}{{3.2.3}{51}}
\citation{wiki_cells}
-\@writefile{toc}{\contentsline {subsubsection}{Database Rules}{51}}
-\FN@pp@footnote@aux{13}{51}
-\FN@pp@footnote@aux{14}{51}
-\FN@pp@footnote@aux{15}{51}
-\@writefile{lof}{\contentsline {figure}{\numberline {3.5}{\ignorespaces System architecture of the ICDS. The arrows indicate the flow of data.}}{52}}
-\newlabel{fig:architecture}{{3.5}{52}}
-\@writefile{toc}{\contentsline {section}{\numberline {3.3}IMSI Catcher Detection System}{52}}
-\newlabel{sec:icds}{{3.3}{52}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Implemetation}{52}}
-\@writefile{lof}{\contentsline {figure}{\numberline {3.6}{\ignorespaces Configuration Dictionary in the settings file.}}{53}}
-\newlabel{fig:python_dict}{{3.6}{53}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Configuration}{53}}
-\newlabel{sec:configuration}{{3.3.2}{53}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.3}Operation}{54}}
-\newlabel{sec:icds_operation}{{3.3.3}{54}}
-\@writefile{lof}{\contentsline {figure}{\numberline {3.7}{\ignorespaces The ICDS main window.}}{55}}
-\newlabel{fig:icds}{{3.7}{55}}
-\@writefile{toc}{\contentsline {paragraph}{Sweep scans:}{57}}
-\@writefile{toc}{\contentsline {paragraph}{CellID Information:}{57}}
-\newlabel{fig:filters_window}{{3.8(a)}{58}}
-\newlabel{sub@fig:filters_window}{{(a)}{58}}
-\newlabel{fig:rules_window}{{3.8(b)}{58}}
-\newlabel{sub@fig:rules_window}{{(b)}{58}}
-\newlabel{fig:databases}{{3.8(c)}{58}}
-\newlabel{sub@fig:databases}{{(c)}{58}}
-\newlabel{fig:encryption_window}{{3.8(d)}{58}}
-\newlabel{sub@fig:encryption_window}{{(d)}{58}}
-\@writefile{lof}{\contentsline {figure}{\numberline {3.8}{\ignorespaces Dialogs for different settings.}}{58}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {Filters window.}}}{58}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Rules window.}}}{58}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(c)}{\ignorespaces {Databases window.}}}{58}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(d)}{\ignorespaces {Encryption window (not yet implemented).}}}{58}}
-\@writefile{toc}{\contentsline {paragraph}{Location Area Database:}{59}}
-\@writefile{toc}{\contentsline {paragraph}{Scan Encryption:}{59}}
-\@writefile{toc}{\contentsline {paragraph}{User Mode:}{59}}
+\@writefile{toc}{\contentsline {subsubsection}{Database Rules}{52}}
+\FN@pp@footnote@aux{13}{52}
+\FN@pp@footnote@aux{14}{52}
+\FN@pp@footnote@aux{15}{52}
+\@writefile{lof}{\contentsline {figure}{\numberline {3.6}{\ignorespaces System architecture of the ICDS. The arrows indicate the flow of data.}}{53}}
+\newlabel{fig:architecture}{{3.6}{53}}
+\@writefile{toc}{\contentsline {section}{\numberline {3.3}IMSI Catcher Detection System}{53}}
+\newlabel{sec:icds}{{3.3}{53}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Implemetation}{53}}
+\@writefile{lof}{\contentsline {figure}{\numberline {3.7}{\ignorespaces Configuration Dictionary in the settings file.}}{54}}
+\newlabel{fig:python_dict}{{3.7}{54}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Configuration}{54}}
+\newlabel{sec:configuration}{{3.3.2}{54}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.3}Operation}{55}}
+\newlabel{sec:icds_operation}{{3.3.3}{55}}
+\@writefile{lof}{\contentsline {figure}{\numberline {3.8}{\ignorespaces The ICDS main window.}}{56}}
+\newlabel{fig:icds}{{3.8}{56}}
+\@writefile{toc}{\contentsline {paragraph}{Sweep scans:}{58}}
+\@writefile{toc}{\contentsline {paragraph}{CellID Information:}{58}}
+\newlabel{fig:filters_window}{{3.9(a)}{59}}
+\newlabel{sub@fig:filters_window}{{(a)}{59}}
+\newlabel{fig:rules_window}{{3.9(b)}{59}}
+\newlabel{sub@fig:rules_window}{{(b)}{59}}
+\newlabel{fig:databases}{{3.9(c)}{59}}
+\newlabel{sub@fig:databases}{{(c)}{59}}
+\newlabel{fig:encryption_window}{{3.9(d)}{59}}
+\newlabel{sub@fig:encryption_window}{{(d)}{59}}
+\@writefile{lof}{\contentsline {figure}{\numberline {3.9}{\ignorespaces Dialogs for different settings.}}{59}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {Filters window.}}}{59}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Rules window.}}}{59}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(c)}{\ignorespaces {Databases window.}}}{59}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(d)}{\ignorespaces {Encryption window (not yet implemented).}}}{59}}
+\@writefile{toc}{\contentsline {paragraph}{Location Area Database:}{60}}
+\@writefile{toc}{\contentsline {paragraph}{Scan Encryption:}{60}}
+\@writefile{toc}{\contentsline {paragraph}{User Mode:}{60}}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\@writefile{toc}{\contentsline {chapter}{\numberline {4}Evaluation}{61}}
@@ -312,14 +317,14 @@
\@writefile{lof}{\contentsline {figure}{\numberline {4.1}{\ignorespaces Scan durations for the sample data sets.}}{62}}
\newlabel{fig:durations}{{4.1}{62}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.1}Scan Duration}{62}}
-\citation{dennis}
\@writefile{lot}{\contentsline {table}{\numberline {4.2}{\ignorespaces Coverage for Google Mobile Maps and OpenCellID on the data sets with the time needed in s for fetching the information.}}{63}}
\newlabel{tab:coverage}{{4.2}{63}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.2}Cell ID Databases}{63}}
-\@writefile{lof}{\contentsline {figure}{\numberline {4.2}{\ignorespaces Open Source IMSI Catcher.}}{64}}
-\newlabel{fig:osic}{{4.2}{64}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.3}Encryption Detection Speed}{64}}
-\@writefile{toc}{\contentsline {section}{\numberline {4.2}IMSI Catcher Detection}{64}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.3}Encryption Detection Speed}{63}}
+\@writefile{toc}{\contentsline {section}{\numberline {4.2}IMSI Catcher Detection}{63}}
+\citation{dennis}
+\@writefile{lof}{\contentsline {figure}{\numberline {4.2}{\ignorespaces Open Source IMSI Catcher (left) with USRP (black) and external clock (blue) and the ICDS (right) with the Motorola C123 connected.}}{64}}
+\newlabel{fig:setup}{{4.2}{64}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.1}Open Source IMSI Catcher}{64}}
\FN@pp@footnote@aux{16}{64}
\FN@pp@footnote@aux{17}{64}
@@ -327,21 +332,25 @@
\@writefile{lof}{\contentsline {figure}{\numberline {4.3}{\ignorespaces Excerpt of a \texttt {OpenBTS.conf}.}}{65}}
\newlabel{fig:openbts_parameters}{{4.3}{65}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.2}Rule Evaluation}{65}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.3}Attack Scenarios}{65}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.4}Long Term Test}{65}}
-\FN@pp@footnotehinttrue
-\@writefile{lot}{\contentsline {subtable}{\numberline{(a)}{\ignorespaces {T-Mobile}}}{66}}
-\@writefile{lot}{\contentsline {subtable}{\numberline{(b)}{\ignorespaces {Vodafone}}}{66}}
-\@writefile{lot}{\contentsline {subtable}{\numberline{(c)}{\ignorespaces {E-Plus}}}{66}}
-\@writefile{lot}{\contentsline {subtable}{\numberline{(d)}{\ignorespaces {O2}}}{66}}
-\@writefile{lot}{\contentsline {table}{\numberline {4.3}{\ignorespaces Consistent parameter configurations in the Freiburg area for the four German providers.}}{66}}
-\newlabel{tab:consistent_parameters}{{4.3}{66}}
-\FN@pp@footnotehinttrue
-\@writefile{toc}{\contentsline {chapter}{\numberline {5}Conclusion}{67}}
+\@writefile{lot}{\contentsline {table}{\numberline {4.3}{\ignorespaces Erroneous configurations for the IMSI catcher.}}{66}}
+\newlabel{tab:err_configs}{{4.3}{66}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.3}Long Term Test}{66}}
+\@writefile{lot}{\contentsline {table}{\numberline {4.4}{\ignorespaces failzor}}{67}}
+\newlabel{tab:par_change}{{4.4}{67}}
+\@writefile{lof}{\contentsline {figure}{\numberline {4.4}{\ignorespaces Takeover attack of an IMSI catcher on a base station.}}{67}}
+\newlabel{fig:takeover_attack}{{4.4}{67}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.4}Attack Scenarios}{67}}
+\FN@pp@footnotehinttrue
+\@writefile{lot}{\contentsline {table}{\numberline {4.5}{\ignorespaces Results of the long term evaluation.}}{68}}
+\newlabel{tab:longterm_test}{{4.5}{68}}
+\@writefile{lot}{\contentsline {table}{\numberline {4.6}{\ignorespaces Consistent parameter configurations in the Freiburg area for the four German providers.}}{68}}
+\newlabel{tab:consistent_parameters}{{4.6}{68}}
+\FN@pp@footnotehinttrue
+\@writefile{toc}{\contentsline {chapter}{\numberline {5}Conclusion}{69}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{lol}{\addvspace {10\p@ }}
-\@writefile{toc}{\contentsline {section}{\numberline {5.1}Future Work}{67}}
+\@writefile{toc}{\contentsline {section}{\numberline {5.1}Future Work}{69}}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
@@ -362,7 +371,7 @@
\bibcite{fox}{12}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
-\@writefile{toc}{\contentsline {chapter}{Bibliography}{69}}
+\@writefile{toc}{\contentsline {chapter}{Bibliography}{71}}
\bibcite{GSM_stats2011}{13}
\bibcite{GSM_history2011}{14}
\bibcite{osmo_slides}{15}
@@ -384,50 +393,48 @@
\bibcite{imsi_wiki}{31}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
-\@writefile{toc}{\contentsline {chapter}{\numberline {A}OsmocomBB}{73}}
+\@writefile{toc}{\contentsline {chapter}{\numberline {A}OsmocomBB}{75}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{lol}{\addvspace {10\p@ }}
-\@writefile{toc}{\contentsline {section}{\numberline {A.1}Installation}{73}}
-\newlabel{sec:osmo_install}{{A.1}{73}}
-\@writefile{toc}{\contentsline {section}{\numberline {A.2}Usage}{74}}
-\newlabel{sec:osmo_usage}{{A.2}{74}}
-\@writefile{toc}{\contentsline {section}{\numberline {A.3}Serial Cable Schematics}{74}}
-\newlabel{sec:osmo_serial_schematics}{{A.3}{74}}
+\@writefile{toc}{\contentsline {section}{\numberline {A.1}Installation}{75}}
+\newlabel{sec:osmo_install}{{A.1}{75}}
+\@writefile{toc}{\contentsline {section}{\numberline {A.2}Usage}{76}}
+\newlabel{sec:osmo_usage}{{A.2}{76}}
+\@writefile{toc}{\contentsline {section}{\numberline {A.3}Serial Cable Schematics}{77}}
+\newlabel{sec:osmo_serial_schematics}{{A.3}{77}}
\FN@pp@footnotehinttrue
-\@writefile{lof}{\contentsline {figure}{\numberline {A.1}{\ignorespaces Schematics for the T191 unlock cable.}}{75}}
-\newlabel{fig:schematics}{{A.1}{75}}
\FN@pp@footnotehinttrue
-\@writefile{toc}{\contentsline {chapter}{\numberline {B}IMSI Catcher Detection System}{77}}
+\@writefile{toc}{\contentsline {chapter}{\numberline {B}IMSI Catcher Detection System}{79}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{lol}{\addvspace {10\p@ }}
-\@writefile{toc}{\contentsline {section}{\numberline {B.1}Extextions}{77}}
-\newlabel{sec:extensions}{{B.1}{77}}
-\@writefile{toc}{\contentsline {section}{\numberline {B.2}Example Configuration}{77}}
-\newlabel{sec:example_config}{{B.2}{77}}
+\@writefile{toc}{\contentsline {section}{\numberline {B.1}Extextions}{79}}
+\newlabel{sec:extensions}{{B.1}{79}}
+\@writefile{toc}{\contentsline {section}{\numberline {B.2}Example Configuration}{80}}
+\newlabel{sec:example_config}{{B.2}{80}}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
-\@writefile{toc}{\contentsline {chapter}{\numberline {C}System Information}{79}}
+\@writefile{toc}{\contentsline {chapter}{\numberline {C}System Information}{83}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{lol}{\addvspace {10\p@ }}
-\newlabel{sec:system_infos}{{C}{79}}
+\newlabel{sec:system_infos}{{C}{83}}
\FN@pp@footnotehinttrue
-\@writefile{lof}{\contentsline {figure}{\numberline {C.1}{\ignorespaces System Information 1 Message}}{80}}
-\@writefile{lof}{\contentsline {figure}{\numberline {C.2}{\ignorespaces System Information 2 Message}}{81}}
-\@writefile{lof}{\contentsline {figure}{\numberline {C.3}{\ignorespaces System Information 3 Message}}{82}}
-\@writefile{lof}{\contentsline {figure}{\numberline {C.4}{\ignorespaces System Information 4 Message}}{83}}
+\@writefile{lof}{\contentsline {figure}{\numberline {C.1}{\ignorespaces System Information 1 Message}}{84}}
+\@writefile{lof}{\contentsline {figure}{\numberline {C.2}{\ignorespaces System Information 2 Message}}{85}}
+\@writefile{lof}{\contentsline {figure}{\numberline {C.3}{\ignorespaces System Information 3 Message}}{86}}
+\@writefile{lof}{\contentsline {figure}{\numberline {C.4}{\ignorespaces System Information 4 Message}}{87}}
\FN@pp@footnotehinttrue
-\@writefile{toc}{\contentsline {chapter}{\numberline {D}Evaluation Data}{85}}
+\@writefile{toc}{\contentsline {chapter}{\numberline {D}Evaluation Data}{89}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{lol}{\addvspace {10\p@ }}
-\@writefile{toc}{\contentsline {section}{\numberline {D.1}IMSI Catcher Configurations}{85}}
-\@writefile{toc}{\contentsline {section}{\numberline {D.2}ICDS Scans}{85}}
+\@writefile{toc}{\contentsline {section}{\numberline {D.1}IMSI Catcher Configurations}{89}}
+\newlabel{sec:config_data}{{D.1}{89}}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
-\@writefile{toc}{\contentsline {chapter}{Acronyms}{87}}
+\@writefile{toc}{\contentsline {chapter}{Acronyms}{91}}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\gdef \LT@i {\LT@entry