GPRS Mobile side security testing
The project is under the responsibility of Swisscom Mobile's SCM-TO-AES Security Manager and the technical responsibility of MC-TO-EO-CNE-CNI. The coaching is provided by SCM-TO-AES Security. The execution is delegated to the University of Applied Sciences of Western Switzerland in Yverdon (EIVD). Due to the sensitivity of the findings, the participants of the projects are binded with a non-disclosure agreement. Swisscom Mobile controls any publication related to this work The main goal of the project is to find and describe potential information security vulnerabilities which are exploitable from the Mobile terminal side. Example of exploitable security issues are: - mobile to mobile hacking or denial of service - attacks against the GPRS infrastructures are systems visible from the client side This task is a consequence of the security testing made during the GPRS network implementation phase and were never finalized.
Etudiant: Jean-Pierre Bussolaro
Année: 2003
Département: TIC
Filière: Informatique et systèmes de communication (anciennement Télécommunications) avec orientation en Réseaux et Services
Partenaire externe: Swisscom Mobile
Enseignant responsable: Stephan Robert
Téléchargement:
- Télécharger l'affiche
Ce travail est confidentiel