Star 0

Abstract

While many security presentations have focused on how GSM-based phones can be manipulated into allowing an attacker to intercept communications to/from the device, very few researchers have focused on how a rogue base station can be used to install malicious software on devices. This session will provide an overview of how such an attack could be carried out.