CheolJun Park Profile
CheolJun Park

@cheoljun_p

Followers
127
Following
248
Media
4
Statuses
22

Postdoc, Electrical Engineering, Cellular Security, KAIST SysSec Lab

대한민국 대전
Joined March 2022
Don't wanna be here? Send us removal request.
@naehrdine
Jiska
1 year
CellGuard goes public! 📶 Check if your iPhone was close to potentially malicious cellular base stations, even on non-jailbroken devices.
@lukasarnld
Lukas Arnold
1 year
Our paper about the initial research conducted with CellGuard, iOS tooling for Qualcomm basebands, and Apple Location Services has been accpeted for @RAID_Conference. Read a preprint at https://t.co/5JY3KPQBoq https://t.co/HjDnM1qYD9
4
52
197
@yongdaek
Yongdae Kim ([email protected])
2 years
@cheoljun_p (CheolJun Park) and @hdtuanss (Tuan Hoang Dinh) at KAIST SysSec lab will give the following presentation at Qualcomm Product Security Summit 2024. "Finding memory bugs in the cellular baseband via over-the-air interface" https://t.co/TuovxINKBi
0
4
19
@yongdaek
Yongdae Kim ([email protected])
2 years
CVE-2022-40536 Transient DOS due to improper authentication in modem Security Rating: High Affected chipsets: Qualcomm basebands CheolJun Park @ KAIST SysSec Lab https://t.co/TRjWDd5T2q https://t.co/WY1LbpH8k6
0
1
3
@yongdaek
Yongdae Kim ([email protected])
2 years
CVE-2022-40521 Transient DOS due to improper authorization in Modem Security Rating: High Affected chipsets: Qualcomm basebands CheolJun Park @ KAIST SysSec Lab https://t.co/TRjWDd5T2q https://t.co/ZbaJWXyLLs
1
1
3
@yongdaek
Yongdae Kim ([email protected])
2 years
CVE-2023-37366 Modem crash due to incorrect handling of malformed NAS message Security Rating: High Affected chipsets: Tensor (Pixel), Exynos basebands CheolJun Park of KAIST SysSec Lab, Marc Egli (@Spittfires_) of EPFL & KAIST SysSec Lab https://t.co/j0ftJqvzIj
1
1
1
@yongdaek
Yongdae Kim ([email protected])
2 years
CVE-2023-32890 Modem crash due to incorrect handling of malformed RRC message Security Rating: Medium Affected chipsets: Mediatek CheolJun Park of KAIST SysSec Lab, Marc Egli (@Spittfires_) of EPFL & KAIST SysSec Lab https://t.co/pVRrKXpjT3 https://t.co/1Umj1Dq709
1
1
1
@yongdaek
Yongdae Kim ([email protected])
2 years
4 baseband CVEs @ KAIST SysSec Jan24 '24: CVE-2023-32890 MediaTek @cheoljun_p @Spittfires_ Dec23 '23: CVE-2023-37366 Samsung Exynos @cheoljun_p @Spittfires_ Jun23 '22: CVE-2022-40521 Qualcomm Snapdragon @cheoljun_p Jun23 '22: CVE-2022-40536 Qualcomm Snapdragon @cheoljun_p 🧵
2
12
62
@acm_wisec
ACM WiSec
3 years
5G user-side security testing framework explained by Evangelos Bitsikas
0
3
25
@yongdaek
Yongdae Kim ([email protected])
3 years
* LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper * We open-source LTESniffer, accepted at @acm_wisec '23. LTESniffer supports: Real-time decoding of + Downlink traffic from the base station. + Uplink traffic from nearby users. https://t.co/WuQ3PtswUw
Tweet card summary image
github.com
An Open-source LTE Downlink/Uplink Eavesdropper. Contribute to SysSec-KAIST/LTESniffer development by creating an account on GitHub.
6
125
339
@cheoljun_p
CheolJun Park
3 years
Kudos to my co-authors @baesangwook89, BeomSeok Oh, Jiho Lee, Eunkyu Lee, @insu_yun, and @yongdaek Also, we sincerely appreciate the @srsRANProject
0
1
4
@cheoljun_p
CheolJun Park
3 years
DoLTEst is also fully open-sourced! You can simply test your phone (UE) using a SDR and a programmable SIM card. When UE connects to DoLTEst, it moves the testing UE's state to the target state, and sends the test messages. Check out our repo: https://t.co/WPY2prS2Nr
github.com
A negative testing framework, DoLTEst, for finding non-standard-compliant bugs in LTE protocol implementations of UEs - SysSec-KAIST/DoLTEst
3
8
15
@cheoljun_p
CheolJun Park
3 years
DoLTEst generates 1,848 invalid/prohibited test cases based on the specification, and implemented on top of srsRAN. We tested 43 devices from top 5 baseband manufacturers. As a result, we found 26 flaws that can lead to location tracking, SMS injection, eavesdropping and etc.
1
4
12
@cheoljun_p
CheolJun Park
3 years
Unfortunately, 3GPP protocol conformance specifications contains only 14 negative test cases out of total 993 scenarios.
1
1
2
@cheoljun_p
CheolJun Park
3 years
DoLTEst will be presented on Wednesday @USENIXSecurity! DoLTEst is a test suite designed to detect non-standard-compliant security bugs by negative testing that checks if prohibited or invalid messages are properly handled.🧵 https://t.co/UAXXzHEbCn
3
8
32
@domenuk
dmnk.bsky.social
4 years
Starting a discord server for Wireless Security (cellular, wifi, bluetooth, SDRs, ...) https://t.co/3jn0RgWWKE
discord.com
A space to exchange ideas regarding wirless security. | 204 members
3
15
42
@cheoljun_p
CheolJun Park
4 years
Lastly, I would like to thank the great CISPA support team and office mates in 2.14 (Keno, Faezeh) for helping me to get used to the CISPA life. + my colleague @changhun_s also came to CISPA. (3/3)
1
0
0
@cheoljun_p
CheolJun Park
4 years
Little about me: -Had a talk on #36C3 about signal overshadowing attack for unicast LTE message. (+ a maintainer of the SigOver GitHub) -Also, I will talk about the downlink negative testing framework for LTE devices, called 'DoLTEst' in USENIX Security'22. (2/3)
1
0
2
@cheoljun_p
CheolJun Park
4 years
Hello @CISPA!  I'm a Ph.D. student from @yongdaek's group in KAIST and will be staying with Thorsten's group for 3 months.  ⁃Discussions on LTE/5G or PHY layer security are always welcomed:) ⁃Say hi when you see me.  ⁃Thanks for the party yesterday, really enjoyed it ☺️ (1/3)
1
0
21
@srsRANProject
srsRAN
4 years
The first #srsRAN release of 2022 is coming next week! 22.04 will bring 5G SA support to srsENB and srsUE. Keep an eye on our social media and mailing list for further updates!
5
20
75
@yongdaek
Yongdae Kim ([email protected])
4 years
* SVE-2021-23582 (CVE-2022-23425): LTE NAS Authentication Bypass Eunsoo Kim, CheolJun Park of KAIST Severity: Critical Improper input validation in Exynos baseband prior to SMR Feb-2022 Release 1 allows attackers to send arbitrary NAS signaling messages with fake base station.
1
2
30