Page 15 - Security testing for USSD and STK based Digital Financial Services applications Security, Infrastructure and Trust Working Group
P. 15

3�4  Man‑in‑the‑middle attacks on STK SIMs         3.4.1   Test Setup
            This test demonstrates the confidentiality of DFS   Setup the SIMtrace hardware using the diagrams and
            transactions as they the interface between the SIM   steps below
            card and the mobile phone. The Osmocom SIMtrace2
                                                          5
            is used to trace SIM-ME communication passively.   a) Place the SIM card to be tested in the SIMtrace
            This test demonstrates the practical case that:      hardware.
                                                               b) Connect the Flexi-cable to the SIMtrace hardware
            a) An attacker with physical access to a mobile      and the SIM end to the socket of the phone.
               device used for DFS could insert a proxy or thin-  c) Connect the SIMtrace  hardware  via  USB  to  the
               SIM, such as the Turbo SIM , between the DFS user   host machine.
                                      6
               SIM card and phone interface to sniff the mobile
               PIN.                                            The figure below shows the schematic representa-
            b) This test also demonstrates that the communica-  tion of the setup.
               tion between the ME and SIM card is not encrypted
               and shows the threats associated with thin SIMs.

            Figure 5 – SIMtrace schematic connection

























































                                                 Security testing for USSD and STK based Digital Financial Services applications  13
   10   11   12   13   14   15   16   17   18   19   20